Application Security News and Articles


Fortinet Extends Generative AI Reach Across Portfolio

Fortinet today extended the reach of its generative artificial intelligence (AI) capabilities to include support for its network detection and response (NDR) and cloud native application protection platform (CNAPP). The post Fortinet Extends ...

The Story of BIX, a Specialized AI Agent for Cybersecurity, Built with NVIDIA AI

 BIX isn’t just an AI assistant—it’s a game-changer in cybersecurity. With BIX, organizations can instantly get clear, actionable answers on everything from vulnerabilities to threat analysis and risk mitigation, transforming massive data ...

DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates

Authors/Presenters: Alon Leviev Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack 

Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations in ways that might not immediately raise alarms. Veriti’s research team recently discovered a targeted email campaign utilizing CVE-2024-38213, ...

AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application

AppOmni announced a partnership that combines the company’s Zero Trust Posture Management (ZTPM) solution with Cisco’s Security Service Edge (SSE) technology suite. The post AppOmni and Cisco Partner to Extend SaaS Security with End-to-End ...

Prevent Security Breaches in Self-Hosted Environments with GitGuardian’s Custom Host for Validity Checks

Stop chasing false positives in your self-hosted instances. With GitGuardian's custom host for validity checks, security teams get real-time insights to prioritize active threats, reduce noise, and prevent costly breaches. The post Prevent ...

A Beginner’s Guide to PCI DSS 4.0: Requirements 1-4

Valid card data is highly sought-after on the cybercrime underground. In fact, it’s helping to drive a global epidemic in payment fraud predicted to reach $40bn by 2026. In a bid to stem losses, the card industry created the Payment Card ...

Shifting Left for Proactive IT Security and ITSM

As organizations prioritize IT security and efficiency, the concept of "shifting left" has gained momentum across both security and service management. Traditionally, many IT security and IT Service Management (ITSM) practices have focused on ...

Fortinet expands GenAI capabilities across its portfolio with two new additions

Fortinet announced the expansion of GenAI capabilities across its product portfolio with the launch of two new integrations with FortiAI, Fortinet’s AI-powered security assistant that uses GenAI to guide, simplify, and automate security analyst ...

Adversary AI Threat Intelligence Content Added to the Tidal Cyber Knowledge Base

GenAI has become more prevalent, making it essential for security teams to know which threat adversaries are using GenAI, and how exactly they are using it. Recognized AI threat researcher and expert Rachel James collaborated with Tidal Cyber to ...

Malwarebytes acquires AzireVPN to boost security for customers

Malwarebytes announced the acquisition of AzireVPN, a renowned privacy-focused VPN provider. Malwarebytes has long been a defender of user privacy through its portfolio of consumer solutions, including Malwarebytes Privacy VPN and its free ad and ...

Permiso Adds Three More Open Source Cybersecurity Tools

Permiso today made available three additional tools under an open-source license that make it simpler to secure cloud computing environments. The post Permiso Adds Three More Open Source Cybersecurity Tools appeared first on Security Boulevard.

Drawbridge simplifies cyber governance for alternative investment firms

Drawbridge is debuting a real-time executive summary of a manager’s cyber risk program. The aim is to enable alternative investment managers (alts managers) to strengthen executive confidence in their firm’s cyber posture by working with ...

Unpacking API Security from Development to Runtime: Key Insights for Cybersecurity Pros

In today’s fast-paced digital ecosystem, APIs are the lifeblood connecting an ever-growing universe of applications and systems, driving efficiency and agility for modern organizations. But as APIs continue to proliferate, they introduce new ...

NIS2 Compliance: How to Get There

Later in the month, our founder Simon Moffatt, will host a webinar panel discussing the rise of NIS2 - what it is, how it impacts identity and security controls and risk management and what pragmatic steps organisations can take to become ...

Industrial companies in Europe targeted with GuLoader

A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader downloader and, ultimately, a remote access trojan that would permit attackers to steal information ...

AudioEye Accessibility Protection Status identifies high-impact areas for improvement

AudioEye launched Accessibility Protection Status, a new benchmark in digital accessibility compliance that empowers businesses to achieve better transparency, clarity, and control over their digital accessibility efforts. With a more accurate ...

Context Is King: From Vulnerability Management to Exposure Management

VM remains a cornerstone of preventive cybersecurity, but organizations still struggle with vulnerability overload and sophisticated threats. Tenable’s new Exposure Signals gives security teams comprehensive context, so they can shift from VM ...

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective. The post MFA Vulnerabilities, ATO, and the Importance of Password Security appeared first on Security Boulevard.

Runtime security in multi-cloud environments: best practices and importance

Understanding Runtime Security in Multi-Cloud Environments Runtime security in multi-cloud environments encompasses the continuous monitoring and protection of The post Runtime security in multi-cloud environments: best practices and importance ...