Application Security News and Articles


New Attack on VPNs

This attack has been feasible for over two decades: Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to ...

Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search

San Francisco, United States, May 7th, 2024, CyberNewsWire Hunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open Cybersecurity Schema Framework (OCSF), coupled with the launch of groundbreaking OCSF-native ...

USENIX Security ’23 – Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs

Authors/Presenters: Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating ...

Sonatype Lifecycle best practices: Reference policies, backup and restore

Fortifying your software development processes against security threats and compliance issues is not just necessary — it's imperative to maintain resilience in today's unpredictable cyber environment. Managing software dependencies effectively ...

Overcoming Limitations of SAST and Other Traditional Software Security Testing Tools

What is Static Application Security Testing? What are the benefits and limitations? How can you expand your testing scope?Continue reading on Medium »

Abnormal extends Account Takeover Protection to cloud apps, introduces AI Security Mailbox

Abnormal Security is expanding its Account Takeover Protection product line beyond email to provide visibility into cross-platform user behavior and centralize compromised account detection and remediation across identity, collaboration, and ...

Dynatrace enhances its platform with new Kubernetes Security Posture Management capabilities

Dynatrace is enhancing its platform with new Kubernetes Security Posture Management (KSPM) capabilities for observability-driven security, configuration, and compliance monitoring. This announcement follows the rapid integration of Runecast ...

Mend.io and Sysdig Launch Joint Solution for Container Security

Learn how Mend.io and Sysdig together cover your cloud native applications throughout the software life cycle. The post Mend.io and Sysdig Launch Joint Solution for Container Security appeared first on Mend. The post Mend.io and Sysdig Launch ...

Eclypsium Supply Chain Security Platform Protects GenAI Infrastructure with Addition of Hardware and Training Model Assessment Capabilities

Eclypsium is extending its digital supply chain security to cover GenAI hardware and training models SAN FRANCISCO – RSA Conference – May 7, 2024 – Eclypsium, the supply chain security company protecting critical hardware, firmware, and ...

Securing Supply Chains for GenAI Hardware and Models

Today, at RSA Conference 2024, we’re announcing new capabilities to help secure the fundamental layers of the GenAI tech stack. First, we’re adding continuous monitoring support for NVIDIA hardware used in training, fine-tuning, and ...

Securing the Vault: ASPM’s Role in Financial Software Protection

Safeguarding software integrity is crucial, especially in vital industries such as finance. According to a report by Carbon Black, the financial sector experiences an average of 10,000 security alerts per day, outstripping most other industries. ...

Enabling GenAI with AI-infused API Security

GenAI has the promise to transform companies, and introduce a lot of security risk. One of the main benefits of GenAI relates to the modernization of apps. Most companies are going through some type of app modernization. They are responding to ...

API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes

AI is rapidly increasing the pace of API creation within organizations, leading to API security becoming as significant as traditional application security. Here’s what you can learn from the top five API breaches of the last quarter. The post ...

Why GenAI fails at full SOC automation

A rapidly growing number of organizations are exploring the use of generative AI tools to transform business processes, improve customer interactions, and enable a variety of new and innovative use cases. But technology leaders who hope to ...

Akamai to acquire Noname for $450 million

Akamai Technologies has announced that it has entered into a definitive agreement to acquire application programming interface (API) security company, Noname Security. Noname, one of the top API security vendors in the market, will enhance ...

Datacenter Proxies: Unveiling the Workhorse of the Proxy World

Reading Time: 4 min Datacenter proxies are the most reliable and affordable type of proxy. Learn how they work and their benefits for businesses. The post Datacenter Proxies: Unveiling the Workhorse of the Proxy World appeared first on Security ...

White House Cybersecurity Workforce Initiative Backed by Tech Titans

No degree? No problem. The federal government and private industry leaders are coordinating to prioritize skills-based hiring to shore up the nation's cybersecurity workforce. The post White House Cybersecurity Workforce Initiative Backed by Tech ...

Ransomware operations are becoming less profitable

As the number of real (and fake) victims of ransomware gangs continues to rise, the number of ransomware payments is falling, along with the average ransom payment. The reasons behind this decrease are many: increased cyber resilience of ...

Vectra AI Platform enhancements combat GenAI attacks

Vectra AI announced an expansion of the Vectra AI Platform to protect enterprises from new threat vectors introduced by the rapid adoption of GenAI tools. The Vectra AI Platform’s patented Attack Signal Intelligence uses behavior-based AI ...

BigID introduces dual-scanning capabilities for cloud native workloads

BigID has introduced a new advancement in cloud data security, privacy, and governance with the launch of its dual-scanning technology. BigID’s dual, or “hybrid”, scanning technology gives organizations speed, efficiency, and ...