Application Security News and Articles
AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, ...
Authors/Presenters: Ege Feyzioglu & Andrew M
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...
We created a new tool to help you install and manage BloodHound instances, BloodHound CLI!
GitHub - SpecterOps/bloodhound-cli
Written entirely in Go, this command-line tool can be cross-compiled to support Windows, macOS, and Linux, so you can ...
Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets’ WhatsApp accounts through a clever phishing campaign. The campaign The campaign started with a spear-phishing ...
Advanced persistent threats (APTs) use sophisticated tools and techniques to breach systems and maintain access—all while remaining undetected. Unlike other cyberattacks, APTs work over an extended period, using more resources to achieve ...
As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, ...
As Southern California continues to battle devastating wildfires, cybercriminals have seized the opportunity to exploit the chaos, targeting vulnerable individuals and organizations.
The post California Wildfires Spark Phishing Scams Exploiting ...
Insight No. 1: HIPAA amendments: More bureaucratic BS?
Most media reports are hyping proposed HIPAA amendments, claiming they'll magically close security gaps. Yeah, right. Like forcing already overwhelmed healthcare providers to jump through ...
Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S. government publishes a playbook for collecting AI vulnerability data. Plus, a White House EO highlights AI security goals. And get the latest on ...
Yahoo Japan enforces DMARC, SPF, and DKIM protocols starting December 2024 to strengthen email security and combat phishing.
The post Yahoo Japan Enforces DMARC Adoption for Users in 2025 appeared first on Security Boulevard.
Cyber threats are becoming more sophisticated and persistent, safeguarding sensitive data is paramount for businesses. From ransomware attacks to data breaches, organizations face constant threats that can compromise their operations and ...
A MikroTik botnet exploited weak SPF configurations, spoofing 20,000 domains to launch widespread malspam campaigns.
The post MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware appeared first on Security Boulevard.
In an exciting development for organizations struggling with data security, 1touch.io has announced its Sensitive Data Intelligence platform as a Software-as-a-Service (SaaS) solution. This release extends 1touch.io’s powerful Contextual ...
The dark web is a thriving underground market where stolen data and corporate vulnerabilities are openly traded. This hidden economy poses a direct and growing threat to businesses worldwide. Recent breaches highlight the danger.
The post How ...
While cloud adoption continues to drive digital transformation, the shift to the cloud introduces critical security challenges that organizations must address.
The post Security Concerns Complicate Multi-Cloud Adoption Strategies appeared first ...
Dynatrace has extended its existing compliance capabilities to support the Digital Operational Resilience Act (DORA) EU regulation. As part of this, Dynatrace is introducing the Compliance Assistant app, purpose-built to provide organizations ...
Most consumers are still unaware of their own role in cybersecurity incidents and continue to place primary blame on external bad actors.
The post Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises appeared first on Security Boulevard.
Bitwarden announced Bitwarden native mobile applications for iOS and Android. These new apps provide significant performance improvements, a smoother user experience, and deeper integration with platform-specific features such as biometric ...
Almost all organizations have their own web applications. Assuming that the security of your web applications is unbreakable is the biggest mistake that one can make. Yes, organizations that get their web application pentesting done on a routine ...
In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and how AI and ML are both fueling these threats and helping to defend ...