Application Security News and Articles


97% of organizations hit by ransomware turn to law enforcement

Sophos has released additional findings from its annual “State of Ransomware 2024” survey. According to the report, among organizations surveyed, 97% of those hit by ransomware over the past year engaged with law enforcement and/or official ...

Security tools fail to translate risks for executives

Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the ...

Cybersecurity jobs available right now: May 8, 2024

CISO Pinsent Masons | United Kingdom | Hybrid – View job details As a CISO, you will be responsible for the overall security posture of the organisation, ensuring the organisation’s information and technology assets are ...

Pktstat: Open-source ethernet interface traffic monitor

Pktstat is an open-source tool that is a straightforward alternative to ncurses-based Pktstat. On Linux, it utilizes AF_PACKET, while on other platforms, it employs generic PCAP live wire capture. Pktstat is a versatile tool that doesn’t ...

The complexities of third-party risk management

In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for ...

How workforce reductions affect cybersecurity postures

In its State of Pentesting Report, Cobalt reveals an industry struggling to balance the use of AI and protecting against it, while facing significant resource and staffing constraints. Pentesting plays a key role in addressing this challenge, ...

NSFOCUS Secures Top Honors at RSA Conference 2024

San Francisco, May 7, 2024 – NSFOCUS, a global leader in cybersecurity, is thrilled to announce our double victory at the prestigious RSAC 2024. We have been honored with two awards from Cyber Defense Magazine (CDM), the industry’s leading ...

Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award

We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Excellence Award, under the category Best API Security Product. Our unwavering commitment to pioneering solutions that safeguard digital ecosystems, and ...

Kaseya Connect Global 2024 Day 3 Recap

Navigating Cybersecurity at Kaseya Connect Global 2024 The final day of Kaseya Connect Global 2024 offered a deep dive intoRead More The post Kaseya Connect Global 2024 Day 3 Recap appeared first on Kaseya. The post Kaseya Connect Global 2024 ...

Google Continues Mixing Generative AI into Cybersecurity

Google is combining multiple streams of threat intelligence with a Gemini generative AI model to create a new cloud service that is designed to help security teams to more quickly and accurately sort through massive amounts of data to better ...

USENIX Security ’23 – The Space of Adversarial Strategies

Authors/Presenters: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

HYPR and Microsoft Partner on Entra ID External Authentication Methods

Last week, Microsoft announced the public preview of external authentication methods (EAM) for Entra ID. As a close partner, HYPR has worked extensively with Microsoft on the new offering and we are excited to be one of the first external ...

2024 OWASP Mobile Top Ten Risks

What is OWASP MASVS? In case you didn't notice, the OWASP Mobile Top 10 List was just updated, for the first time since 2016! This is important for developers since this list represents the list of the most crucial mobile application security ...

Google Makes Implementing 2FA Simpler

Google is encouraging the adoption of multi-factor authentication to protect against phishing and other cyberattacks. It hopes 2-Step Verification (2SV) can help. The post Google Makes Implementing 2FA Simpler appeared first on Security Boulevard.

RSAC 2024: IoT Security Questions (and Answers)

The 2024 RSA Conference is underway, and Viakoo is out in force.  During the conference as we meet with customers, prospects, media, and analysts I will try to cherry pick some of the more interesting questions related to IoT Security.  Over ...

Danile Stori’s ‘Vulnerable Code’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Danile Stori’s ‘Vulnerable Code’ appeared first on Security Boulevard.

Balancing AI Workloads and Energy Demands with DCIM Software

The rapid expansion of artificial intelligence (AI) applications has presented new challenges for data center management, particularly in balancing workload efficiency with energy consumption. Data Center Infrastructure Management (DCIM) software ...

Introducing Aembit Access Management for CI/CD Platforms

4 min read Our identity federation capability better secures and streamlines CI/CD workflows, like in GitHub Actions and GitLab, with short-lived, secretless credentials. The post Introducing Aembit Access Management for CI/CD Platforms appeared ...

Guts & Greed: How Bug Hunter Arrogance and Apathy Hurts Us All

Explore why bug hunters should be more patient as vendors try to improve their application security maturity from a VDP to a BBP. The post Guts & Greed: How Bug Hunter Arrogance and Apathy Hurts Us All appeared first on Dana Epp's Blog. The ...

LockBit leader unmasked: US charges Russian national

Russian national Dmitry Khoroshev is “LockBitSupp”, the creator, developer and administator of the infamous LockBit ransomware group, according to UK, US and Australia law enforcement agencies. The US Justice Deparment has unsealed ...