Application Security News and Articles


Red Hat Enterprise Linux 9.5 helps organizations simplify operations

Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across ...

Best 7 Compliance Risk Assessment Tools for 2024

Organizations devote significant resources to their compliance risk assessments each year. Yet many compliance leads and senior executives feel stuck in a cycle of repetition and question whether these efforts yield meaningful benefits.  Do you ...

Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage

Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of ...

How Intel is making open source accessible to all developers

In this Help Net Security interview, Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel, discusses the company’s commitment to fostering an open ecosystem as a cornerstone of its software strategy. He explains how this ...

OnDMARC by Red Sift Alternatives: Top Alternatives and Competitors

Seeking a robust Red Sift OnDMARC alternative? Explore top 10 options for advanced DMARC protection. Enhance email security and deliverability. The post OnDMARC by Red Sift Alternatives: Top Alternatives and Competitors appeared first on Security ...

Zero-days dominate top frequently exploited vulnerabilities

A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious ...

What 2025 holds for user identity protection

In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as ...

How cybersecurity failures are draining business budgets

Security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps, according to Panaseer. ...

Unused AWS services lead to unexpected costs. Here’s how to turn them off

In a company, who owns the cloud? It’s not always clear. Maybe a better question is: who is responsible for the cloud’s cost? That answer is always the head of Operations. This person could be titled as ‘DevOps,’ or running a ...

Top Bot Attack Predictions for Holiday Sales 2024

Get ready for holiday 2024 bot attacks. Learn how adversaries are targeting eCommerce to disrupt sales and what you can do to protect revenue and customer trust. The post Top Bot Attack Predictions for Holiday Sales 2024 appeared first on ...

DEF CON 32 – Splitting The Email Atom Exploiting Parsers To Bypass Access Controls

Authors/Presenters: Gareth Heyes Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Sonatype recognized as a leader in SCA software in Forrester Wave

We are thrilled to announce that The Forrester Wave™: Software Composition Analysis Software, Q4 2024 recently named Sonatype a leader in software composition analysis (SCA) software. Sonatype received the highest scores in the current offering ...

The Role of Threat Intelligence in Preventing Ransomware

The ransomware threat landscape remains a persistently nefarious one. The threat stays consistent despite the fact that the actors carrying out these attacks are often in flux. Dedicated ransomware gangs emerge and disband regularly. Lone actors ...

Response to CISA Advisory (AA24-317A): 2023 Top Routinely Exploited Vulnerabilities

In response to the recently published CISA Advisory (AA24-317A) that disseminates the top routinely exploited vulnerabilities from 2023, AttackIQ has proposed a multitude of recommendations that customers can take to emulate these prevalent ...

Randall Munroe’s XKCD ‘Number Shortage’

via the comic humor & dry wit of Randall Munroe, creator of XKCD The post Randall Munroe’s XKCD ‘Number Shortage’ appeared first on Security Boulevard.

Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024

See why Mend.io is recognized as a Strong Performer in The Forrester Wave™ Software Composition Analysis (SCA) Q4 2024 report. The post Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024 appeared first ...

These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER

‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability. The post These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER appeared first on Security ...

PlatformEngineering.com: Strengthening Security in the Software Development Lifecycle 

The Techstrong Group is thrilled to announce the launch of PlatformEngineering.com, a new platform dedicated to advancing the platform engineering discipline. This addition to the Techstrong family—including Security Boulevard—promises to be ...

Infostealer Malware: An Introduction

Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of ...

PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025

As the year winds down, it’s the perfect time to pause for retrospection. 2024 has been both exciting and challenging for the PKI and CLM space, pushing the industry to rethink strategies and adapt. From the explosive growth of non-human and ...