Application Security News and Articles


Bitwarden unveils native mobile applications for iOS and Android

Bitwarden announced Bitwarden native mobile applications for iOS and Android. These new apps provide significant performance improvements, a smoother user experience, and deeper integration with platform-specific features such as biometric ...

What is Web Application Pentesting and How to Conduct It?

Almost all organizations have their own web applications. Assuming that the security of your web applications is unbreakable is the biggest mistake that one can make. Yes, organizations that get their web application pentesting done on a routine ...

Balancing usability and security in the fight against identity-based attacks

In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and how AI and ML are both fueling these threats and helping to defend ...

MSSqlPwner: Open-source tool for pentesting MSSQL servers

MSSqlPwner is an open-source pentesting tool tailored to interact with and exploit MSSQL servers. Built on Impacket, it enables users to authenticate with databases using various credentials, including clear-text passwords, NTLM hashes, and ...

Homeowners are clueless about how smart devices collect their data

Homeowners are increasingly concerned about data privacy in smart home products, according to Copeland. Homeowners see smart devices as boosting home security Homeowners are still generally comfortable in using new technology, but this year smart ...

EU takes decisive action on healthcare cybersecurity

The Commission has presented an EU action plan aimed at strengthening the cybersecurity of hospitals and healthcare providers. The initiative is an essential step in shielding the healthcare sector from cyber threats. Digitalization is ...

New infosec products of the week: January 17, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Atsign, Cisco, Commvault, and IT-Harvest. Cisco AI Defense safeguards against the misuse of AI tools Cisco AI Defense is purpose-built for enterprises to ...

A Peek Inside the Current State of BitCoin Exchanges

Dear blog readers, In this post I'll provide some actionable intelligence on the current state of active BitCoin Exchanges landscape with the idea to assist everyone on their way to properly attribute a fraudulent or malicious transaction or to ...

A Peek Inside the Current State of BitCoin Mixers

Dear blog readers, In this post I'll provide some actionable intelligence on the current state of active BitCoin Mixers landscape with the idea to assist everyone on their way to properly attribute a fraudulent or malicious transaction or to dig ...

Open Redirect? Game Over! Salt Security Neutralizes a Sneaky API Attack Vector

We are excited to announce a significant Salt Security API Protection Platform upgrade. We have recently introduced a new detection feature targeting a prevalent yet often neglected vulnerability: open redirect attacks. This issue is so severe ...

BeyondTrust Breach Exposes API Key Abuse Risks

3 min readWhen a single API key compromise spiraled into a broader attack, it exposed how overlooked non-human identities can become gateways for escalating threats. The post BeyondTrust Breach Exposes API Key Abuse Risks appeared first on ...

Tonic.ai product updates: April 2024

SQL Server support on Tonic Ephemeral, Db2 LUW on Tonic Structural, LLM synthesis in Tonic Textual, and expanded LLM access in Tonic Validate! Learn more about all the latest releases from Tonic.ai. The post Tonic.ai product updates: April 2024 ...

Tonic.ai product updates: July 2024

Textual's Pipeline workflow preps your data for AI, Structural's sensitivity scan is now customizable, and Ephemeral can be deployed on Azure or Google Cloud! The post Tonic.ai product updates: July 2024 appeared first on Security Boulevard.

Test your apps with high-fidelity, production-like data with Release and Tonic

In this guest article from Release CTO and co-founder Erik Landerholm, Release shares best practices on getting production-like data in your lower environments by way of their new integration with Tonic. The post Test your apps with ...

Tonic.ai product updates: March 2024

Tonic is now Tonic Structural and can output directly to Tonic Ephemeral, subsetting arrives for Snowflake, + Tonic Cloud is HIPAA certified! The post Tonic.ai product updates: March 2024 appeared first on Security Boulevard.

Tonic.ai product updates: February 2024

Tonic Ephemeral launches with free trials, Tonic Textual supports expanded file types, and database view has a brand new look

DEF CON 32 – Signature-Based Detection Using Network Timing

Author/Presenter: Josh Pyorre Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Including Email Address Accounts – Part Six

Dear blog readers, The following is a recently data mined compilation of cybercrime-friendly XMPP/Jabber account IDs which I'm sharing with the idea to assist everyone on their cyber threat actor attribution efforts and to assist U.S Law ...

Dancho Danchev’s Testimony on “How Facebook Today’s Meta Failed To Protect Its Users and React To The Koobface Botnet And What We Should Do About It?”

Dear blog readers, This is Dancho. How to use this manual testimony? - Reference me Dancho Danchev - My web site (https://ddanchev.blogspot.com) - My research portfolio as PoC (Proof of Concept) (https://archive.org/details/@ddanchev) - My ...

Randall Munroe’s XKCD ‘Radon’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Radon’ appeared first on Security Boulevard.