Application Security News and Articles


RansomHub Affiliate leverages Python-based backdoor

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor […] The post RansomHub Affiliate leverages Python-based backdoor appeared first on Security Boulevard.

DEF CON 32 – Small Satellite Modeling and Defender Software

Author/Presenter: Kyle Murbach Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

FBI Deletes PlugX Malware From Computers Infected by China Group

A Chinese-based threat group called Mustang Panda was using a variant of the PlugX malware to infected U.S. Windows computers and steal information. The FBI, with help from French authorities and a private company, deleted the malicious code from ...

Protecting the software supply chain: Insights from our expert panel

As software grows increasingly complex, ensuring the security of your software supply chain remains a critical priority. The post Protecting the software supply chain: Insights from our expert panel appeared first on Security Boulevard.

Best test data management solutions

Compare the leading Test Data Management solutions to assess how they deliver in key criteria, such as data quality, ease of use, and performance, and determine how they meet the needs of modern testing and development environments. The post Best ...

Randall Munroe’s XKCD ‘Chess Zoo’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chess Zoo’ appeared first on Security Boulevard.

Allstate Violates Drivers’ Privacy, Texas AG Alleges

Don’t Mess With Texas Privacy: “We will hold all these companies accountable,” rants state attorney general Ken Paxton (pictured). The post Allstate Violates Drivers’ Privacy, Texas AG Alleges appeared first on Security Boulevard.

Intune Attack Paths — Part 1

Intune Attack Paths — Part 1 Prior Work Several people have recently produced high-quality work around Intune tradecraft. I want to specifically mention: Chris Thompson and his work on Maestro Dirk-jan Mollema and his work with Primary ...

OWASP Top 10: What’s C Got to Do With It?

Deb Radcliff interviews OWASP Top Ten core team member Brian Glas. What do the OWASP Top Ten web application vulnerabilities have to do with C languages? And where do those vulnerabilities coincide with Software Bills of Materials (SBOMs)?  As ...

Redacting sensitive free-text data: build vs buy

Building an in-house redaction system requires overcoming significant technical challenges and investing considerable resources to develop and maintain the process. This article explores some of the challenges you may face if your organization ...

Going beyond ‘shift left’: Why shared responsibility is key to risk management

  The post Going beyond ‘shift left’: Why shared responsibility is key to risk management appeared first on Security Boulevard.

Rsync vulnerabilities allow remote code execution on servers, patch quickly!

Six vulnerabilities have been fixed in the newest versions of Rsync (v3.4.0), two of which could be exploited by a malicious client to achieve arbitrary code execution on a machine with a running Rsync server. “The client requires only ...

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Silver Spring, United States / Maryland, 15th January 2025, CyberNewsWire The post Aembit Announces Speaker Lineup for the Inaugural NHIcon appeared first on Security Boulevard.

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Tel Aviv, Israel, 15th January 2025, CyberNewsWire The post Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04% appeared first on Security Boulevard.

Sweet Security Leverages LLM to Improve Cloud Security

Sweet Security today added a cloud detection engine to its cybersecurity portfolio that makes use of a large language model (LLM) to identify potential threats in real-time. The post Sweet Security Leverages LLM to Improve Cloud Security appeared ...

5 Things Government Agencies Need to Know About Zero Trust

Zero trust as a concept is simple to grasp. Implementing a zero trust architecture, on the other hand, is complex because it involves addressing a unique mix of process, procedure, technology and user education. Here are some considerations to ...

FBI removed PlugX malware from U.S. computers

The Justice Department announced on Tuesday that, alongside international partners, the FBI deleted “PlugX” malware from thousands of infected computers worldwide. As described in court documents unsealed in the Eastern District of ...

Grip vs. TPRM | Amplify your TPRM Strategy

Discover how Grip complements TPRM platforms by uncovering shadow SaaS, enhancing identity security, and addressing risks traditional TPRM methods miss. The post Grip vs. TPRM | Amplify your TPRM Strategy appeared first on Security Boulevard.

The CISOs Guide to Cyber Recovery

The rapid increase in cyberattacks is putting greater pressure on Cyber Resilience and IT Infrastructure teams to ensure the reliability, integrity, and availability of their systems The post The CISOs Guide to Cyber Recovery appeared first on ...

Large Language Models and Regulations: Navigating the Ethical and Legal Landscape

Leverage the full potential of Large Language Models (LLMs) for your business while staying compliant. The post Large Language Models and Regulations: Navigating the Ethical and Legal Landscape appeared first on Scytale. The post Large Language ...