Application Security News and Articles


GDPR Compliance in the US: Checklist and Requirements

The European Union (EU)’s General Data Protection Regulation (GDPR) isn’t just a European concern. As GDPR-U.S. interactions become more complex, international businesses (including American ones) must comply with this regulation when ...

AI Code Generation: The Risks and Benefits of AI in Software

AI code generation is changing how developers approach their work. Modern code completion AI tools like GitHub Copilot and ChatGPT offer faster development cycles, improved productivity, and the ability to automate repetitive tasks.  The post AI ...

What PCI Attestation of Compliance Is and How to Get It

Every time a customer swipes their credit card, they trust that business to protect their sensitive payment information against mishandling or fraud. But proving that trust in the right place requires certification. The post What PCI Attestation ...

Understanding the Principle of Least Privilege (PoLP)

The rule of least privilege, also known as the principle of least privilege (PoLP), is a security measure for safeguarding sensitive systems and data. PoLP ensures that users, applications, and systems have only the minimum access necessary to ...

Imperva Protects Against the Exploited CVEs in the Cleo Data Theft Attacks

The Clop ransomware group has once again demonstrated its ability to exploit vulnerabilities to compromise sensitive systems. As Cleo—a managed file transfer provider for businesses—grapples with the aftermath of Clop’s targeted attack on ...

DEF CON 32 – A (Shallow) Dive Into World Of Aircraft PKI

Author/Presenter: Matt Gaffney Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Start the year by protecting your privacy— A stalkerware quick check

Imagine starting the New Year with hopes of a fresh start, only to realize that someone might be tracking your every move without your consent. Disconcerting, to say the least.   The post Start the year by protecting your privacy— A ...

Randall Munroe’s XKCD ‘Uncanceled Units’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Uncanceled Units’ appeared first on Security Boulevard.

Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban

Not For You: “Protecting Americans from Foreign Adversary Controlled Applications Act” shouldn’t be enforced, orders President Trump. The post Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban appeared first on Security Boulevard.

Life at SpecterOps Part II: From Dream to Reality

TL;DR We are hiring consultants at various levels. The job posting can be found under the Consultant opening here: https://specterops.io/careers/#careers Introduction Hey, it’s me again! The last time we spoke back in August 2024, I told you ...

Healthcare Cybersecurity: The Chronic Condition We Can’t Ignore

Cyber breaches in healthcare are chronic conditions that can linger for years, quietly draining resources and eroding trust. Imagine a chronic disease. There’s the immediate crisis phase that demands urgent attention—medication, hospital ...

DEF CON 32 – Analyzing the Security of Satellite Based Air Traffic Control

Author/Presenter: Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Forescout Report Detail Hunters International Ransomware Gang Tactics

An analysis of the operations of Hunters International, the ransomware-as-a-service platform that has been used to compromise more than 200 organizations, conducted by Forescout Technologies reveals the cybercriminal syndicate that created it is ...

Entrust unveils AI-powered facial biometric authentication capability

Entrust introduced AI-powered identity verification as a new capability for its Identity-as-a-Service (IDaaS) platform. As cyber threats evolve and grow more sophisticated, businesses are facing escalating risks and financial losses. In 2024, US ...

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t… Tue, 01/21/2025 - 14:56 Organizations worldwide face a “perfect storm” of increasing and ever-evolving cyber threats. Internal and external factors are at ...

Consilio Guided AI PrivDetect reduces privilege review time

Consilio launched Guided AI PrivDetect, a privilege detection solution that combines artificial intelligence and knowledge graph technology to accelerate and enhance the accuracy of privilege review. This solution, developed entirely within ...

Almost 10% of GenAI Prompts Include Sensitive Data: Study

A study by cybersecurity startup Harmonic Security found that 8.5% of prompts entered into generative AI models like ChatGPT, Copilot, and Gemini last year included sensitive information, putting personal and corporate data at risk of being ...

2025 Prediction 4: Cyber Attacks Targeting High-Net-Worth Individuals Will Increase, Targeting Not Only Their Financial Lives but also Their Brands And Reputations

On January 7, we published a press release to share our five predictions for cybersecurity in 2025. Over the next few weeks, we’ll publish a blog series that provides additional commentary on each prediction. This is the second blog in the ...

Seceon’s OTM Platform: Revolutionizing Cybersecurity

Seceon’s Open Threat Management (OTM) platform provides comprehensive, real-time threat detection and automated responses, empowering organizations to safeguard their entire infrastructure with ease. The Seceon OTM (Open Threat Management) ...

Ransomware attackers are “vishing” organizations via Microsoft Teams

The “email bombing + posing as tech support via Microsoft Teams” combination is proving fruitful for two threat actors looking to deliver ransomware to organizations, and they seem to be ramping up their efforts. “Sophos MDR has ...