Application Security News and Articles


Conveying Your Security Needs to the Board in Six Minutes or Less 

CISOs must take advantage by making the most of their limited time with effective and informative messaging.  The post Conveying Your Security Needs to the Board in Six Minutes or Less  appeared first on Security Boulevard.

Atsign NoPorts desktop client simplifies secure remote access

Atsign announced its new desktop client. This tool makes the protection of critical infrastructure easier by empowering people of all technical levels to securely connect to their devices, servers, and cloud instances, elevating remote access ...

What is Payment Parameter Tampering And How to Prevent It?

Web-based attacks are becoming increasingly sophisticated, and payment parameter tampering stands out as a silent yet potent threat. This attack involves manipulating parameters exchanged between the client and server to alter sensitive ...

This is the year CISOs unlock AI’s full potential

In 2025, CISOs will have powerful new capabilities as generative artificial intelligence (GenAI) continues to mature. Evolving beyond providing answers to questions, GenAI will provide proactive recommendations, take action, and communicate in a ...

How AI and ML are transforming digital banking security

In this Help Net Security interview, Nuno Martins da Silveira Teodoro, VP of Group Cybersecurity at Solaris, discusses the latest advancements in digital banking security. He talks about how AI and ML are reshaping fraud detection, the growing ...

Cybersecurity jobs available right now: January 14, 2025

Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission, or disclosure of sensitive data, ...

What 2024 taught us about security vulnerabilties

From zero-day exploits to weaknesses in widely used software and hardware, the vulnerabilities uncovered last year underscore threat actors’ tactics and the critical gaps in organizational defenses. This roundup showcases the standout ...

Grip vs SSPM: What’s the Difference? | Grip Security

Discover how Grip complements SSPM tools by uncovering shadow SaaS, and addressing identity risks, providing comprehensive SaaS security for your organization. The post Grip vs SSPM: What’s the Difference? | Grip Security appeared first on ...

Grip vs CASB: What’s the Difference?

Discover how Grip complements CASBs by reducing alert noise, uncovering shadow SaaS, and providing identity-based insights for comprehensive SaaS security. The post Grip vs CASB: What’s the Difference? appeared first on Security Boulevard.

Why Scalability Matters in Non-Human Identity and Access Management

6 min readFrom dynamic workloads to API-driven systems, managing non-human identities requires a new approach to security at scale. The post Why Scalability Matters in Non-Human Identity and Access Management appeared first on Aembit. The post ...

HHS Proposes Major Overhaul of HIPAA Security Rule in the Wake of Change Healthcare Breach 

The new rules come in the wake of the Change Healthcare breach, which exposed the electronic personal health information of about 100 million Americans. The post HHS Proposes Major Overhaul of HIPAA Security Rule in the Wake of Change Healthcare ...

FunkSec: A New Ransomware Group Buoyed by AI

A new ransomware group called FunkSec claimed 85 victims in December but its members appear to be lesser-skilled hackers using generative AI and inflated attack numbers to bolster their capabilities and reputation, according to Check Point ...

UK domain registry Nominet breached via Ivanti zero-day

The number of internet-facing Ivanti Connect Secure instances vulnerable to attack via CVE-2025-0282 has fallen from 2,048 to 800 in the last four days, the Shadowserver Foundation shared today. In the meantime, UK domain registry Nominet became ...

DEF CON 32 – Sneaky Extensions The MV3 Escape Artists

Authors/Presenters: Vivek Ramachandran, Shourya Pratap Singh Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center revealed a flood of suspicious emails. The culprit? A ...

Ephemeral data environments in Azure, leveraging the cloud

Our test data infrastructure solution, Tonic Ephemeral, streamlines data provisioning to eliminate lags in your testing workflows. Today, we’re going to look at the expanded benefits you can reap when deploying Ephemeral self-hosted in ...

De-identifying Salesforce data for testing and development. Tonic Structural now connects to Salesforce

All the functionality that you know and love in Tonic Structural (generators, subsetting, consistency, and more) is now available to use with your Salesforce data directly. This integration enables users to effortlessly test their Salesforce ...

How to create de-identified embeddings with Tonic Textual & Pinecone

To protect private information stored in text embeddings, it’s essential to de-identify the text before embedding and storing it in a vector database. In this article, we'll demonstrate how to de-identify and chunk text using Tonic Textual, and ...

How Ephemeral on-demand data can improve DORA DevOps scores

Understand the performance metrics used to produce the DORA scores and how on-demand data from Tonic Ephemeral, as well as the integration between Ephemeral and Tonic Structural, can improve the DORA score for your development teams The post How ...

Open Bullet 2: The Preferred Credential Stuffing Tool for Bots

Open Bullet 2 is an open-source software, specialized in credential stuffing attacks, i.e. attacks that use bots to automatically steal user accounts at scale by automatically testing stolen credentials found in data breaches. It can target both ...