Application Security News and Articles


Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP

Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the technology it gained with the acquisition of Next DLP earlier this year. The post Fortinet Adds Data Loss Prevention Capability Following Acquistion of ...

Potential Cybersecurity Threats to the 2024 U.S. Election: Voter Database Leaks

As the 2024 U.S. presidential election takes place, cybersecurity analysts are on high alert, warning of voter database leaks. They are warning of an increasingly complex landscape that could jeopardize voter data security and election integrity ...

The Future of Identity Protection: Real-Time Threats and Scams

In today’s digital landscape, protecting your identity from real-time threats is more critical than ever. As a cybersecurity expert, I’ve seen an evolving spectrum of threats that go far beyond traditional identity theft. From classic dark ...

Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw

Google researchers behind the vendor's Big Sleep project used the LLM-based AI agent to detect a security flaw in SQLite, illustrating the value the emerging technology can have in discovering vulnerabilities that techniques like fuzzing ...

DEF CON 32 – MaLDAPtive: Obfuscation and De-Obfuscation

Authors/Presenters: Daniel Bohannon, Sabajete Elezaj Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Why PKIaaS is a Smarter and Secure Alternative to On-Premises PKI

Private PKI (Public Key Infrastructure) is critical for trusted authentication and secure communication among internal applications, devices, workloads, machines, and services. While most organizations understand its importance, managing it ...

Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail

HTML sanitization has long been touted as a solution to prevent malicious content injection. However, this approach faces numerous challenges. In this blog post, we'll explore the limitations of server-side HTML sanitization and discuss why ...

SEC action raises the bar on software transparency

The U.S. Securities and Exchange Commission (SEC) recently announced fines amounting to nearly $7 million for violations of financial disclosure rules in the wake of the SunBurst attack on SolarWinds.  The post SEC action raises the bar on ...

Lumifi acquires Critical Insight to boost incident response capabilities

Lumifi announces the acquisition of Critical Insight, marking its third acquisition in 13 months. This strategic move expands Lumifi’s service offerings and strengthens its presence in the healthcare and critical infrastructure ...

Beware of phishing emails delivering backdoored Linux VMs!

Unknown attackers are trying to trick Windows users into spinning up a custom Linux virtual machine (VM) with a pre-configured backdoor, Securonix researchers have discovered. The campaign The attack began with a phishing email, they believe, but ...

Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration

Building cyber resilience so that you can persistently prevent, withstand, and recover from disruptions to your network infrastructure is becoming increasingly important. The post Strengthen Cyber Resilience: A Checklist for ITOps and SecOps ...

Pacific Rim: Chronicling a 5-year Hacking Escapade

Contributors to this post: Mickey Shkatov, Alex Bazhaniuk So What Happened? Last week, Sophos released a bombshell report on what they’re calling “Pacific Rim”—and no, we’re not talking about giant robots fighting sea monsters. Sophos ...

AIs Discovering Vulnerabilities

I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in ...

Recovering From a Breach: 4 Steps Every Organization Should Take 

The reality is, that despite our best efforts, breaches happen. And there’s a lot less information on how to respond versus how to prevent.   The post Recovering From a Breach: 4 Steps Every Organization Should Take  appeared first on ...

How PTaaS Supports Shift-Left Security Practices?

Security and development teams often face a tough challenge: delivering a secure, quality product quickly without bogging down the pipeline. Security testing is traditionally squeezed in late, sometimes even right... The post How PTaaS Supports ...

Google patches actively exploited Android vulnerability (CVE-2024-43093)

Google has delivered fixes for two vulnerabilities endangering Android users that “may be under limited, targeted exploitation”: CVE-2024-43047, a flaw affecting Qualcomm chipsets, and CVE-2024-43093, a vulnerability in the Google ...

Report: Voice of Practitioners 2024 – The True State of Secrets Security

In this study, GitGuardian and CyberArk reveal the stark reality of secrets management across 1,000 organizations. With 79% experiencing secrets leaks and an average remediation time of 27 days, the findings expose critical gaps between security ...

Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response

As security teams level up to support the cloud-native transition, three major issues keep impeding detection and response in the cloud. The post Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response appeared first on ...

BigID DSPM Starter App enhances data security posture for Snowflake customers

BigID launched Data Security Posture Management (DSPM) Starter App, built natively in Snowflake and using the Snowflake Native App Framework. BigID’s DSPM Starter App will be available via Snowflake Marketplace and provide rapid data ...

Leveraging Tabletop exercises to Enhance OT security maturity

Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security programs running in compliance with IEC 62443? ...