Application Security News and Articles


Adversary AI Threat Intelligence Content Added to the Tidal Cyber Knowledge Base

GenAI has become more prevalent, making it essential for security teams to know which threat adversaries are using GenAI, and how exactly they are using it. Recognized AI threat researcher and expert Rachel James collaborated with Tidal Cyber to ...

Malwarebytes acquires AzireVPN to boost security for customers

Malwarebytes announced the acquisition of AzireVPN, a renowned privacy-focused VPN provider. Malwarebytes has long been a defender of user privacy through its portfolio of consumer solutions, including Malwarebytes Privacy VPN and its free ad and ...

Permiso Adds Three More Open Source Cybersecurity Tools

Permiso today made available three additional tools under an open-source license that make it simpler to secure cloud computing environments. The post Permiso Adds Three More Open Source Cybersecurity Tools appeared first on Security Boulevard.

Drawbridge simplifies cyber governance for alternative investment firms

Drawbridge is debuting a real-time executive summary of a manager’s cyber risk program. The aim is to enable alternative investment managers (alts managers) to strengthen executive confidence in their firm’s cyber posture by working with ...

Unpacking API Security from Development to Runtime: Key Insights for Cybersecurity Pros

In today’s fast-paced digital ecosystem, APIs are the lifeblood connecting an ever-growing universe of applications and systems, driving efficiency and agility for modern organizations. But as APIs continue to proliferate, they introduce new ...

NIS2 Compliance: How to Get There

Later in the month, our founder Simon Moffatt, will host a webinar panel discussing the rise of NIS2 - what it is, how it impacts identity and security controls and risk management and what pragmatic steps organisations can take to become ...

Industrial companies in Europe targeted with GuLoader

A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader downloader and, ultimately, a remote access trojan that would permit attackers to steal information ...

AudioEye Accessibility Protection Status identifies high-impact areas for improvement

AudioEye launched Accessibility Protection Status, a new benchmark in digital accessibility compliance that empowers businesses to achieve better transparency, clarity, and control over their digital accessibility efforts. With a more accurate ...

Context Is King: From Vulnerability Management to Exposure Management

VM remains a cornerstone of preventive cybersecurity, but organizations still struggle with vulnerability overload and sophisticated threats. Tenable’s new Exposure Signals gives security teams comprehensive context, so they can shift from VM ...

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective. The post MFA Vulnerabilities, ATO, and the Importance of Password Security appeared first on Security Boulevard.

Runtime security in multi-cloud environments: best practices and importance

Understanding Runtime Security in Multi-Cloud Environments Runtime security in multi-cloud environments encompasses the continuous monitoring and protection of The post Runtime security in multi-cloud environments: best practices and importance ...

Subverting LLM Coders

Really interesting research: “An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection“: Abstract: Large Language Models (LLMs) have transformed code com- pletion ...

North Korean hackers employ new tactics to compromise crypto-related businesses

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to ...

Avoiding Blocklistings: Part 3 – Take Matters into Your Own Hands to Protect Your Senders

Welcome back to the final instalment of our three-part series, where Lauren Meyer, CMO at SocketLabs, shares her top strategies for avoiding block listings. In Part 3, Lauren explores the proactive steps YOU can take to help senders avoid ...

Avoiding Blocklistings: Part 2 – Monitor and Educate Your Customers

Welcome back to Part 2 of our three-part series, where Lauren Meyer, CMO at SocketLabs, shares her top strategies for avoiding block listings. In Part 2, Lauren dives into how you can proactively monitor activity and educate your customers to ...

Avoiding Blocklistings: Part 1 – Set Yourself AND Your Senders Up for Success

Building on the success of our popular LinkedIn Live with Melinda Plemel and Lauren Meyer, CMO at SocketLabs, Lauren has generously shared her top strategies for avoiding block listings in this three-part blog series. The post Avoiding ...

Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418)

Cisco has fixed a critical command injection vulnerability (CVE-2024-20418) affecting its Ultra-Reliable Wireless Backhaul (URWB) Access Points that can be exploited via a HTTP requests and allows complete compromise of the devices. There are no ...

NIST CSF 2.0 Critical

What is NIST CSF 2.0 Critical? NIST CSF CRITICAL is a custom cybersecurity framework designed to streamline and enhance the implementation of the NIST Cybersecurity Framework (CSF) by utilizing the most relevant controls from NIST 800-53 and ...

Texas Data Privacy and Security Act (TDPSA)

What is the Texas Data Privacy and Security Act? The Texas Data Privacy and Security Act (TDPSA) is a state law designed to protect the privacy and security of Texas residents’ personal information. Enacted to align with a growing national ...

Oregon Consumer Privacy Act (OCPA)

What is the Oregon Consumer Privacy Act? The Oregon Consumer Privacy Act (OCPA) is a state privacy law that sets guidelines for how businesses should collect, use, and protect the personal data of Oregon residents. Signed into law in 2023, OCPA ...