Application Security News and Articles
Google researchers recently published proof-of-concept code demonstrating the ability to create malicious microcode patches on AMD processors from Zen 1 through Zen 4. This vulnerability would allow an attacker to arbitrarily alter the execution ...
Building effective cyber security training for executives is no longer just an option—it’s a business necessity. In today’s rapid information sharing world, executive cyber awareness is
The post Cyber security training for executives: Why ...
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. ...
Qualys introduced TotalAppSec, an AI-powered application risk management solution designed to unify API security, web application scanning and web malware detection across on-premises, hybrid and multi-cloud environments.
The post Qualys ...
Expel announced expanded security information and event management (SIEM) coverage, including a new low-cost data lake offering, allowing customers to meet compliance and data storage requirements more effectively while strengthening their ...
New Jersey lawmakers advanced a bill that would make it a crime to knowingly create and distribute AI-generated deepfake visual or audio content for nefarious purposes, the latest step in an ongoing push at the state and national level to address ...
Chainalysis’ latest report on how the ransomware landscape changed from 2023 to 2024 shows a promising trend: An increasing number of victims refuses to pay the ransom. The total volume of ransom payments decreased year-over-year by ...
Technology infrastructure services company Kyndryl has launched end-to-end Secure Access Service Edge (SASE) services as a market offering that supports Palo Alto Networks Prisma SASE services.
The post Classy SASE, Kyndryl Edges Closer To Palo ...
Astra Security and Invary have received new funding to fuel development of their vulnerability scanning and runtime security solutions.
The post Astra, Invary Raise Millions for AI-Powered Pentesting, Runtime Security appeared first on SecurityWeek.
ActiveState launched its Vulnerability Management as a Service (VMaas) offering that revolutionizes how organizations manage open source and accelerates secure software delivery. ActiveState’s Vulnerability Management as a Service combines ...
Spanish authorities have arrested an individual who allegedly hacked several high-profile organizations, including NATO and the US army.
The post Hacker Who Targeted NATO, US Army Arrested in Spain appeared first on SecurityWeek.
Enterprises are shifting toward security tool consolidation as cyberthreats grow in complexity, opting for integrated platforms over fragmented, multi-vendor solutions.
The post Security Consolidation Improves Efficiency, Threat Mitigation ...
Corero Network Security announced new advancements in multi-site resiliency and intelligent traffic management, further strengthening its ability to deliver always-on DDoS protection. Designed to mitigate large-scale cyberattacks, operational ...
Executives today operate in an increasingly connected world, where their digital presence is often as visible as their professional reputation. From corporate bios and media interviews to personal social media activity, an executive’s digital ...
Five Eyes cybersecurity agencies have released guidance on securing edge devices against increasing threats.
The post Five Eyes Agencies Release Guidance on Securing Edge Devices appeared first on SecurityWeek.
Most people know that robots no longer sound like tinny trash cans. They sound like Siri, Alexa, and Gemini. They sound like the voices in labyrinthine customer support phone trees. And even those robot voices are being made obsolete by new ...
The blame of security incidents may be shared—but the burden of response always falls on the security team. Here’s how to prepare for the inevitable.
The post Security Teams Pay the Price: The Unfair Reality of Cyber Incidents appeared first ...
Artificial Intelligence (AI) is transforming industries by automating tasks, improving decision-making, and enhancing cybersecurity. However, AI models are increasingly being targeted by adversarial attacks, which can manipulate or compromise ...
Critical vulnerabilities in Cisco Identity Services Engine could lead to elevation of privileges and system configuration modifications.
The post Cisco Patches Critical Vulnerabilities in Enterprise Management Product appeared first on ...
The Spanish National Police has arrested a hacker suspected of having breached national and international agencies (including the United Nation’s International Civil Aviation Organization and NATO), Spanish universities and companies, and ...