Application Security News and Articles


Critical vulnerabilities persist in high-risk sectors

Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest vulnerabilities The report, which analyzes data from over 200,000 dynamic ...

New infosec products of the week: November 15, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra. Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory ...

SAST vs. DAST: What’s the Difference and Why It Matters for App Security

by Revel Aldwin (DevSecOps Consultant at ITSEC Asia)Continue reading on Medium »

NIST report on hardware security risks reveals 98 failure scenarios

NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report ...

Palo Alto Networks Issues AI Red Alert

SANTA CLARA, Calif. — With great promise comes potential peril. And while artificial intelligence (AI) is looked upon as a panacea for enterprises, it also poses an existential security threat. “We stand at the intersection of human ...

DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller

Authors/Presenters: Timm Lauser, Jannis Hamborg Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

The Ultimate Guide to Data Masking in SQL Server

If you’re exploring data masking in SQL Server, how can you decide which SQL masking method is right for you? Learn all about your options here. The post The Ultimate Guide to Data Masking in SQL Server appeared first on Security Boulevard.

Generating High Quality Test Data for MySQL Through De-identification and Synthesis

As one of the most popular open-source databases, widely used for web applications, MySQL is no stranger to PII and sensitive data. At the same time, its users need production-like data for effective development and testing. Here are the ...

How to Mask Sensitive Data in Files, from CSV to JSON

Tonic’s file connector is a quick and easy way to get de-identified data to power your development. Simply upload data in files (such as CSV) to detect and mask sensitive data, and then generate new output files for safe, fast use. The post How ...

Business Logic Attacks Target Election-Related Sites on Election Day

As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex threat that manipulates the ...

Is SOAR Obsolete?

Let’s look at the factors behind the push to declare the end of SOAR, consider their merits, and determine whether or not SOAR is obsolete. The post Is SOAR Obsolete? appeared first on D3 Security. The post Is SOAR Obsolete? appeared first on ...

How to Defend Non-Human Identities from Infostealers

4 min read The identity layer’s most insidious threat is now setting its sights on a different group of targets. Here's how to be ready. The post How to Defend Non-Human Identities from Infostealers appeared first on Aembit. The post How to ...

Blinded by Silence

Blinded by Silence: How Attackers Disable EDR Overview Endpoint Detection and Response systems (EDRs) are an essential part of modern cybersecurity strategies. EDR solutions gather and analyze data from endpoints to identify suspicious ...

Randall Munroe’s XKCD ‘Geometriphylogenetics’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Geometriphylogenetics’ appeared first on Security Boulevard.

Busting Ransomware’s Billion-Dollar Boom with Network Observability and Security

Ransomware-as-a-service (RaaS) is the first example of a specific threat becoming a financially viable business model. The subscription model approach has propelled ransomware to be one of the most pervasive cyber threats of our time, evolving ...

Who’s Afraid of a Toxic Cloud Trilogy?

The Tenable Cloud Risk Report 2024 reveals that nearly four in 10 organizations have workloads that are publicly exposed, contain a critical vulnerability and have excessive permissions. Here’s what to watch for in your organization. In a ...

Black Friday bots are coming—is your e-commerce site prepared?

Black Friday and Cyber Monday bring an influx of both shoppers and bots to your website. Make sure bots don't steal your profits this holiday season with the right preparations. The post Black Friday bots are coming—is your e-commerce site ...

From risks to resilience: Best practices for software supply chain security

As software supply chains evolve in complexity, managing security risks has become an ever-changing challenge. New threats emerge daily, driven by rapid innovation and the heavy reliance on open source components. The post From risks to ...

NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities

NIST, the embattled agency that analyzes security vulnerabilities, has cleared the backlog of known CVEs that hadn't been processed but needs more time to clear the entire backlog of unanalyzed flaws. The post NIST Clears Backlog of Known ...

ISO/IEC 27001 Certification: Process and Costs

To safeguard your company’s data against hackers, scammers, and other web criminals, you need an effective system. And one of the most foolproof ways is achieving ISO/IEC 27001 certification. The post ISO/IEC 27001 Certification: Process and ...