Application Security News and Articles


Security is Actually a Data Search Problem: How We Win by Treating it Like One

The reality is stark: Cybersecurity isn’t an endpoint problem or a reactive defense game—it’s a data search problem. The post Security is Actually a Data Search Problem: How We Win by Treating it Like One appeared first on Security Boulevard.

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. ...

Lookout Mobile Intelligence APIs identifies cross-platform attacks

Lookout announced their new Lookout Mobile Intelligence Application Programming Interfaces (APIs), exponentially expanding the scope of visibility into enterprise mobile security data. Lookout Mobile Intelligence APIs integrate critical security ...

The Quiet Rise of the ‘API Tsunami’

As enterprises increasingly adopt cloud-native architectures, microservices, and third-party integrations, the number of Application Programming Interfaces (APIs) has surged, creating an “API tsunami” in an organization's infrastructure that ...

48,000+ internet-facing Fortinet firewalls still open to attack

Despite last week’s confirmation of and warnings about long-standing exploitation of CVE-2024-55591, a critical vulnerability affecting Fortinet Fortigate firewalls, too many vulnerable devices are still accessible from the Internet and ...

DataDome DDoS Protect detects application layer-based threats

DataDome unveiled DDoS Protect, a cloud-based service designed to block distributed denial-of-service (DDoS) attack traffic at the edge before it overwhelms an organization’s infrastructure. DDoS Protect provides always-on, full-stack ...

Comprehensive Guide to Application Security Testing Software

Discover how application security testing software enhances vulnerability detection and safeguards your applications.Continue reading on Medium »

Why Hedge Funds Must Prioritize Secrets Security

Protect hedge fund assets from secrets-related attacks. Learn how GitGuardian provides visibility and control over secrets and mitigates the risks of hardcoded secrets. The post Why Hedge Funds Must Prioritize Secrets Security appeared first on ...

DataDome Unveils DDoS Protect to Block Attack Traffic at the Edge

DDoS Protect safeguards businesses against downtime, resource drain, and reputation damage caused by DDoS attacks. The post DataDome Unveils DDoS Protect to Block Attack Traffic at the Edge appeared first on Security Boulevard.

Xona Platform simplifies user access deployment

Xona Systems launched new Xona Platform. Designed to provide simple user access without allowing insecure user endpoints from connecting to critical assets, the platform is redefining how industries such as utilities, oil & gas, and ...

Developing Security Protocols for Agentic AI Applications 

Agentic AI can be an incredibly powerful asset — like another member of the team. However, it can quickly become a liability due to poorly designed frameworks or lax security protocols. The post Developing Security Protocols for Agentic AI ...

EnGenius Cloud Managed ESG320 VPN Router improves security and network performance

EnGenius released EnGenius Cloud Managed ESG320 VPN Router. Designed to meet the growing demands of small businesses, the ESG320 delivers enterprise-grade performance, security, and simplified cloud-based management, making it the ideal choice ...

Inversion6 launches service to help companies combat cyber threats

Inversion6 launched its new Incident Response (IR) Service, a comprehensive offering to help organizations effectively manage, mitigate and recover from cybersecurity incidents. “Our new service empowers businesses to respond to incidents ...

Supported Security: Integrating PAM with DevSecOps

Are We Doing Enough to Secure Non-Human Identities? NHIs: An Overlooked Pillar of Modern Security Where digital transformation is accelerating across all industries, how secure are your Non-Human Identities (NHIs)? As an essential component of ...

Trust in Cloud Compliance: Ensuring Regulatory Alignment

Can Your Organization Trust in Cloud Compliance? As businesses increasingly transition to cloud-based operations, the question arises: Can we trust the cloud to keep our data secure and compliant? With the rise of regulatory standards and data ...

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this cyberespionage campaign, the attackers compromised the legitimate ...

Acronis CISO on why backup strategies fail and how to make them resilient

In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures, and offers actionable advice for organizations looking to improve their backup and recovery ...

Privacy professionals feel more stressed than ever

Despite progress made in privacy staffing and strategy alignment, privacy professionals are feeling increasingly stressed on the job within a complex compliance and risk landscape, according to new research from ISACA. Top three obstacles facing ...

Cybersecurity books on ransomware you shouldn’t miss

This list of ransomware-focused cybersecurity books is tailored for professionals seeking practical insights and deeper knowledge. Covering technical strategies, real-world cases, and the evolving tactics of attackers, these books offer valuable ...

Improving Security Posture with Smarter Firewall Policies: Lessons from IDC’s Latest InfoBrief

Hybrid environments have rapidly become a staple of modern IT infrastructure. Organizations are increasingly combining on-premises, cloud, and edge computing resources, creating a complex network infrastructure that requires meticulous ...