Application Security News and Articles


Context is King: Using API Sessions for Security Context

There’s no doubt that API security is a hot topic these days. The continued growth in API-related breaches and increase in publicized API vulnerabilities has pushed API security to the top of CISO’s lists. The tools in the market for API ...

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

4Critical 82Important 1Moderate 0Low Microsoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in ...

Randall Munroe’s XKCD ‘Proterozoic Rocks’

Permalink The post Randall Munroe’s XKCD ‘Proterozoic Rocks’ appeared first on Security Boulevard.

Scaling Global Protection: DataDome Expands to Over 30 Points of Presence (PoP) Worldwide

DataDome's point of presence (PoP) network has expanded to over 30 locations worldwide, delivering seamless, fast protection to our customers across the globe. The post Scaling Global Protection: DataDome Expands to Over 30 Points of Presence ...

Is the latest book on “Pentesting APIs” any good?

Let's explore the latest book by Packt Publishing on "Pentesting APIs" and see if it's worth putting on an API hacker's bookshelf. The post Is the latest book on “Pentesting APIs” any good? appeared first on Dana Epp's Blog. The post Is the ...

Infostealer Malware: An Introduction

Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of ...

Fake IP checker utilities on npm are crypto stealers

Recently identified npm packages called "node-request-ip", "request-ip-check" and "request-ip-validator" impersonate handy open source utilities relied upon by developers to retrieve an external IP address but instead target Windows, Linux and ...

DEF CON 32 – Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows

Authors/Presenters: Samy Kamkar Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Explore Tidal Cyber with our Demo Video Library

Are you interested in digging a little deeper into how Tidal Cyber works? Our video library of brief demo tours shows how Tidal Cyber empowers security teams with Threat-Informed Defense. Each video dives into a different aspect of Tidal Cyber ...

ARMO selected by Orange Business to Secure its Managed Kubernetes Services

We’re honored to share a new partnership with Orange Business (Norway), a global leader in digital services. ARMO The post ARMO selected by Orange Business to Secure its Managed Kubernetes Services appeared first on ARMO. The post ARMO selected ...

BlackFog platform enhancements boost data loss prevention

BlackFog launched its next generation enterprise platform to deliver even more powerful ransomware and insider threat prevention. BlackFog’s pioneering platform focuses specifically on anti data exfiltration to prevent unauthorized data from ...

Creating an Effective User Access Review Program in 12 Simple Steps

User access reviews are periodic evaluations of access rights to ensure they align with users’ roles, reducing security risks and helping maintain regulatory compliance. The main goal of user access reviews is to prevent unauthorized access to ...

Akamai App Platform reduces the complexity associated with managing Kubernetes clusters

Akamai announced the Akamai App Platform, a ready-to-run solution that makes it easy to deploy, manage, and scale highly distributed applications. The Akamai App Platform is built on top of the cloud native Kubernetes technology Otomi, which ...

Druva empowers businesses to secure data throughout Microsoft environments

Druva announced support for Microsoft Dynamics 365 to help enterprises secure mission-critical data across Dynamics 365 Sales and Customer Service CRM modules. With support for Dynamics 365, Druva ensures customers can keep business-critical CRM ...

Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT

In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), […] The post Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, ...

Insurance Firm Introduces Liability Coverage for CISOs

National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O policies. The ...

Gauging the Safety Level of Your Software with Spectra Assure

It’s been a little over a year since we first introduced security levels into Spectra Assure™ with the goal of reducing the remediation burden on developers. It automatically generates a plan for addressing prioritized software risks, ...

F5 AI Gateway secures and optimizes access to AI applications

F5 announced early access of F5 AI Gateway to streamline interactions between applications, APIs, and large language models (LLMs) driving enterprise AI adoption. This powerful containerized solution optimizes performance, observability, and ...

OWASP Top 10 for LLM and new tooling guidance targets GenAl security

New guidance for organizations seeking to protect the generative AI tools they're running has been released by the OWASP Top 10 LLM Applications Security Project. The post OWASP Top 10 for LLM and new tooling guidance targets GenAl security ...

Hot Topic breach: Has your credit card info been compromised?

If you’re wondering whether your personal and financial data has been compromised in the massive Hot Topic breach, you can use two separate online tools to check: Have I Been Pwned? or DataBreach.com. Which data was compromised? News of a ...