Application Security News and Articles
The European Union (EU)’s General Data Protection Regulation (GDPR) isn’t just a European concern. As GDPR-U.S. interactions become more complex, international businesses (including American ones) must comply with this regulation when ...
AI code generation is changing how developers approach their work. Modern code completion AI tools like GitHub Copilot and ChatGPT offer faster development cycles, improved productivity, and the ability to automate repetitive tasks.
The post AI ...
Every time a customer swipes their credit card, they trust that business to protect their sensitive payment information against mishandling or fraud. But proving that trust in the right place requires certification.
The post What PCI Attestation ...
The rule of least privilege, also known as the principle of least privilege (PoLP), is a security measure for safeguarding sensitive systems and data. PoLP ensures that users, applications, and systems have only the minimum access necessary to ...
The Clop ransomware group has once again demonstrated its ability to exploit vulnerabilities to compromise sensitive systems. As Cleo—a managed file transfer provider for businesses—grapples with the aftermath of Clop’s targeted attack on ...
Author/Presenter: Matt Gaffney
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...
Imagine starting the New Year with hopes of a fresh start, only to realize that someone might be tracking your every move without your consent. Disconcerting, to say the least.
The post Start the year by protecting your privacy— A ...
via the comic humor & dry wit of Randall Munroe, creator of XKCD
Permalink
The post Randall Munroe’s XKCD ‘Uncanceled Units’ appeared first on Security Boulevard.
Not For You: “Protecting Americans from Foreign Adversary Controlled Applications Act” shouldn’t be enforced, orders President Trump.
The post Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban appeared first on Security Boulevard.
TL;DR
We are hiring consultants at various levels. The job posting can be found under the Consultant opening here: https://specterops.io/careers/#careers
Introduction
Hey, it’s me again! The last time we spoke back in August 2024, I told you ...
Cyber breaches in healthcare are chronic conditions that can linger for years, quietly draining resources and eroding trust. Imagine a chronic disease. There’s the immediate crisis phase that demands urgent attention—medication, hospital ...
Author/Presenter: Martin Strohmeier
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...
An analysis of the operations of Hunters International, the ransomware-as-a-service platform that has been used to compromise more than 200 organizations, conducted by Forescout Technologies reveals the cybercriminal syndicate that created it is ...
Entrust introduced AI-powered identity verification as a new capability for its Identity-as-a-Service (IDaaS) platform. As cyber threats evolve and grow more sophisticated, businesses are facing escalating risks and financial losses. In 2024, US ...
Three Keys to Modernizing Data Security: DSPM, AI, and Encryption
andrew.gertz@t…
Tue, 01/21/2025 - 14:56
Organizations worldwide face a “perfect storm” of increasing and ever-evolving cyber threats. Internal and external factors are at ...
Consilio launched Guided AI PrivDetect, a privilege detection solution that combines artificial intelligence and knowledge graph technology to accelerate and enhance the accuracy of privilege review. This solution, developed entirely within ...
A study by cybersecurity startup Harmonic Security found that 8.5% of prompts entered into generative AI models like ChatGPT, Copilot, and Gemini last year included sensitive information, putting personal and corporate data at risk of being ...
On January 7, we published a press release to share our five predictions for cybersecurity in 2025. Over the next few weeks, we’ll publish a blog series that provides additional commentary on each prediction. This is the second blog in the ...
Seceon’s Open Threat Management (OTM) platform provides comprehensive, real-time threat detection and automated responses, empowering organizations to safeguard their entire infrastructure with ease. The Seceon OTM (Open Threat Management) ...
The “email bombing + posing as tech support via Microsoft Teams” combination is proving fruitful for two threat actors looking to deliver ransomware to organizations, and they seem to be ramping up their efforts. “Sophos MDR has ...