Application Security News and Articles


Wultra Secures €3M to Protect Financial Institutions from Quantum Threats

Prague, Czech republic, 15th January 2025, CyberNewsWire The post Wultra Secures €3M to Protect Financial Institutions from Quantum Threats appeared first on Security Boulevard.

7 Ways to Maximize the Value of DDoS Testing

These days, there are plenty of ways to run DDoS simulation testing and make sure you’re protected against attacks. You can do it on your own using commercial software or open-source tools—whatever works best for you. That said, there are a ...

Feel Supported with Top-tier Machine Identity Solutions

How Does Machine Identity Management Transform Your Cybersecurity Landscape? Imagine an organization where every non-human identity (NHI) is not just known, but also managed effectively. Can you envisage the security, control, and efficiency that ...

Contextal Platform: Open-source threat detection and intelligence

Contextal Platform is an open-source cybersecurity solution for contextual threat detection and intelligence. Developed by the original authors of ClamAV, it offers advanced features such as contextual threat analysis, custom detection scenarios ...

Using cognitive diversity for stronger, smarter cyber defense

In this Help Net Security interview, Mel Morris, CEO of Corpora.ai, discusses how cognitive biases affect decision-making during cybersecurity incidents. Morris shares insights on the challenges of designing user-friendly cybersecurity tools that ...

Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now

As 2024 drew to a close, Google caught global attention with the announcement of its latest quantum computing chip, Willow. Many believe that with Willow, Google has set a new benchmark for 2025, unveiling the extraordinary potential of quantum ...

Cybersecurity is stepping into a new era of complexity

Cybersecurity is entering a new era of complexity, according to the World Economic Forum’s Global Cybersecurity Outlook 2025 report. Growing complexity intensifies cyber inequity This complexity arises from the rapid growth of emerging ...

The Future of Cybersecurity: Global Outlook 2025 and Beyond

The cybersecurity landscape is entering an unprecedented era of complexity, with AI-driven threats, geopolitical tensions, and supply chain vulnerabilities reshaping how organizations approach digital security. This analysis explores key trends ...

Patch Tuesday Update – January 2024

The post Patch Tuesday Update - January 2024 appeared first on Digital Defense. The post Patch Tuesday Update – January 2024 appeared first on Security Boulevard.

Microsoft fixes actively exploited Windows Hyper-V zero-day flaws

Microsoft has marked January 2025 Patch Tuesday with a hefty load of patches: 157 CVE-numbered security issues have been fixed in various products, three of which (in Hyper-V) are being actively exploited. The exploited Hyper-V vulnerabilities ...

Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security

Attacks on individual applications were down month to month in December 2024, but one of the most dangerous types of attacks was up significantly. That’s according to data Contrast Security publishes monthly about the detection and response of ...

How to Prevent Risk From Unknown Build Assets

Find out why unknown build assets is a growing problem and how Legit can help. The post How to Prevent Risk From Unknown Build Assets appeared first on Security Boulevard.

CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild

Fortinet patched a zero day authentication bypass vulnerability in FortiOS and FortiProxy that has been actively exploited in the wild as a zero-day since November 2024. Background On January 14, Fortinet released a security advisory ...

DEF CON 32 – Pick Your Poison: Navigating A Secure Clean Energy Transition

Authors/Presenters: Emma Stewart Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Leading Fintech Accelerates PCI DSS 4.0 Compliance with Symmetry Systems

SYMMETRY CUSTOMER CASE STUDY Leading Fintech Accelerates PCI DSS 4.0 Compliance with Symmetry Systems ABOUT Industry:Fintech Size:1K – 3K employees... The post Leading Fintech Accelerates PCI DSS 4.0 Compliance with Symmetry Systems appeared ...

Microsoft’s January 2025 Patch Tuesday Addresses 157 CVEs (CVE-2025-21333, CVE-2025-21334, CVE-2025-21335)

10Critical 147Important 0Moderate 0Low Microsoft addresses 157 CVEs in the first Patch Tuesday release of 2025 and the largest Patch Tuesday update ever with three CVEs exploited in the wild, and five CVEs publicly disclosed prior to patches ...

The AI Revolution: Navigating Cybersecurity Challenges in 2025

As we stand on the threshold of 2025, the cybersecurity landscape is undergoing a dramatic transformation, largely driven by artificial intelligence and emerging threat vectors. Drawing from Nuspire’s recent cybersecurity outlook webinar, ...

Randall Munroe’s XKCD ‘Trimix’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Trimix’ appeared first on Security Boulevard.

Sanitizing Unstructured Data In Motion—and Why It’s Important

The post Sanitizing Unstructured Data In Motion—and Why It’s Important appeared first on Votiro. The post Sanitizing Unstructured Data In Motion—and Why It’s Important appeared first on Security Boulevard.

Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)

Fortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that has been exploited as a zero-day by attackers to compromise publicly-exposed FortiGate firewalls. While ...