Application Security News and Articles


Sanitizing Unstructured Data In Motion—and Why It’s Important

The post Sanitizing Unstructured Data In Motion—and Why It’s Important appeared first on Votiro. The post Sanitizing Unstructured Data In Motion—and Why It’s Important appeared first on Security Boulevard.

Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)

Fortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that has been exploited as a zero-day by attackers to compromise publicly-exposed FortiGate firewalls. While ...

Six Friends Every Security Team Needs

Around the year 1900, an author (Rudyard Kipling) wrote a poem called “The Elephant’s Child.” In it, he writes: “I keep six honest serving men They taught me all I knew Their names are What and Why and When And How and Where and Who.”  ...

ScrapedIn: How Bots Turn Social Media into Advanced Social Engineering

See how multi-channel scams target new hires through fake texts and emails, and learn practical steps to protect your organization from persistent social engineering attacks. The post ScrapedIn: How Bots Turn Social Media into Advanced Social ...

GitGuardian 2024: Advancing NHI Security on All Fronts

A look back at 2024: A year of breakthroughs, advancements, and unwavering commitment to elevating NHI and secrets security for organizations. The post GitGuardian 2024: Advancing NHI Security on All Fronts appeared first on Security Boulevard.

DEF CON 32 – SBOMs the Hard Way: Hacking Bob the Minion

Authors/Presenters: Larry Pesce Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Microsoft Sues Group for Creating Tools to Bypass Azure AI Security

Microsoft is suing 10 unknown people involved in a sophisticated scheme to exploit users credentials to access the vendor's Azure OpenAI AI services, bypass security guardrails, and post harmful images using its cloud systems. The post Microsoft ...

Insights Release Notes 16.2.41-16.3.3: Compliance & Integrations

Over the last couple of months, we’ve been working on making a number of significant updates to Fairwinds Insights. We’ve delivered some great new functionality that our Insights customers will definitely benefit from. It’s now easier to ...

Malicious actors’ GenAI use has yet to match the hype

Generative AI has helped lower the barrier for entry for malicious actors and has made them more efficient, i.e., quicker at creating convincing deepfakes, mounting phishing campaigns and investment scams, the most recent report by the Cyber ...

Stellar upgrades data recovery capabilities for Windows users

Stellar announced the latest version of its flagship software, Stellar Data Recovery for Windows. The software is powered by new device scan functionality and features a refreshed UI that is designed to help users retrieve data while requiring no ...

Commvault strengthens Microsoft Active Directory protection

Commvault introduced an expansion of its platform to provide full and automated forest recovery for the world’s most widely used enterprise identity and access solution, Microsoft Active Directory. As organizations continue to combat ...

Commvault Adds Ability to Recover Entire Instances of Active Directory

Commvault today added an ability to automatically recover the instances of Microsoft Active Directory (AD) that have become primary targets of cybersecurity attacks. The post Commvault Adds Ability to Recover Entire Instances of Active Directory ...

Reemployment Project: Meet Julia High

In this episode, host Peter dives into the challenges of the tech job market in 2023 and 2024 and introduces us to Julia, a dynamic writer and content strategist with a fascinating background in computational cognitive neuroscience. Julia shares ...

2025 Prediction 2: The Rise Of AI-Generated Deepfake Attacks Will Escalate In 2025 And Will Continue To Target High-Profile Individuals

On January 7, we published a press release to share our five predictions for cybersecurity in 2025. Over the next few weeks, we’ll publish a blog series that provides additional commentary on each prediction. This is the second blog in the ...

Critical Infrastructure Seeing Benefits of Government Program, CISA Says

CISA in two years has seen the number of critical infrastructure organizations signing up for its CPG services double, which has improved the overall security in most sectors, but more needs to be done to strengthen what has become a target ...

BSIMM15: New focus on securing AI and the software supply chain

Explore key trends in the BSIMM15 report, such as securing AI and the software supply chain, plus recommendations for enhancing your software security program. The post BSIMM15: New focus on securing AI and the software supply chain appeared ...

2025 Prediction 3: Digital Security Will Expand Beyond Privacy Concerns To Include Holistic, Integrated Cyber and Physical Protection

On January 7, we published a press release to share our five predictions for cybersecurity in 2025. Over the next few weeks, we’ll publish a blog series that provides additional commentary on each prediction. This is the second blog in the ...

The Insider Threat Digital Recruitment Marketplace

Nisos The Insider Threat Digital Recruitment Marketplace Nisos routinely monitors mainstream and alternative social media platforms, as well as cloud-based messaging applications and dark web forums... The post The Insider Threat Digital ...

Future-Proofing Cloud Security: Trends and Predictions for 2025 and Beyond 

In this article, we touch on the trends and predictions that in the year 2025 and beyond will fashion cloud security. The post Future-Proofing Cloud Security: Trends and Predictions for 2025 and Beyond  appeared first on Security Boulevard.

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Fifteen Best Practices to Navigate the Data Sovereignty Waters josh.pearson@t… Tue, 01/14/2025 - 08:04 Data sovereignty—the idea that data is subject to the laws and regulations of the country it is collected or stored in—is a fundamental ...