Application Security News and Articles


Network Configuration and Change Management Best Practices

Managing network configurations and changes is a critical component of modern IT operations, ensuring organizations maintain security, operational efficiency, and business continuity. In today’s fast-paced and complex technology environments, ...

Attackers are encrypting AWS S3 data without using ransomware

A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. They ...

How to generate safe, useful test data for Amazon Redshift

Amazon Redshift enables massive data warehousing capabilities, but creating quality mock data designed to mimic data stored in Redshift comes with significant challenges. Here are the problems involved and tools you need to tackle each with ...

How to create realistic test data for Databricks with Tonic

Learn how to create realistic test data for Databricks with Tonic's latest integration! Yes, you read that right: We’re the only data masking and synthesis platform to offer a native streamlined Databricks integration. The post How to create ...

How to create realistic, safe, document-based test data for MongoDB

Safely generating NoSQL test data designed to mirror existing document collections entails significant challenges when data privacy and data utility are at stake. Here's what you need to know to successfully de-identify and synthesize your data ...

DEF CON 32 – Detecting Persistent Threats On Draytek Devices

Authors/Presenters: Octavio Gianatiempo, Gastón Aznarez Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

What is Breach Readiness?

While many organizations devote countless resources to stopping attacks at the perimeter, today’s threat landscape calls for a different mindset. The concept of breach readiness begins with acknowledging the likelihood of an incident, then ...

Privacy Roundup: Week 2 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 5 JAN 2025 - 11 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due to ...

EU law enforcement training agency data breach: Data of 97,000 individuals compromised

Personal data of nearly 100,000 individuals that have participated in trainings organized by CEPOL, the European Union (EU) Agency for Law Enforcement Training, has potentially been compromised due to the cyberattack suffered by the agency in May ...

AppOmni Delivers First SaaS Security Checks for CISA Binding Operational Directive 25-01

AppOmni has announced their free SCuBA compliance assessment that adheres to the new policy changes for CISA’s BOD 25-01 mandate. The post AppOmni Delivers First SaaS Security Checks for CISA Binding Operational Directive 25-01 appeared first ...

New SEC Rules and Requirements | How ADR Enhances SEC Cybersecurity Compliance | Contrast Security

Research shows that the majority of companies filing cybersecurity reports are doing so twice as long after an incident as the Securities and Exchange Commission (SEC) requires: nine days instead of the rule’s stipulated four days. Perhaps a ...

Botnet Threat Update July to December 2024

Overall botnet command control (C&C) activity decreased marginally by -4% between July and December last year. China dominated the Top 20 charts with increased botnet C&C activity across domain registrars and networks, ranking #1 globally ...

Alleged Blender, Sinbad cryptomixer operators arrested, indicted

Three Russian nationals have been indicted in the Northern District of Georgia for their alleged role as operators of cryptocurrency mixing (cryptomixer) services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich ...

How to Capitalize on 5 Trends Shaping the Future of Pentesting

Continuous testing is a major contributor to cybersecurity that’s so advanced, integrated and proactive that it doesn’t just prevent an attack but wards off attackers altogether.  The post How to Capitalize on 5 Trends Shaping the Future of ...

How Your Digital Footprint Fuels Cyberattacks — and What to Do About It 

Hackers are exploiting the digital breadcrumbs — your personally identifiable information (PII) — that you leave behind daily to launch their cyber attacks. The post How Your Digital Footprint Fuels Cyberattacks — and What to Do About It  ...

Top 6 Compliance Management Tools for Financial Services

The financial services industry is arguably one of the most highly regulated sectors worldwide. This is due to the sensitivity of the data handled, the potential for widespread economic disruption, and the industry’s central role in global ...

AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude

Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal data. ...

GitHub CISO on security strategy and collaborating with the open-source community

In this Help Net Security, Alexis Wales, CISO at GitHub, discusses how GitHub embeds security into every aspect of its platform to protect millions of developers and repositories, ensuring it remains a trustworthy platform for building secure ...

Chainsaw: Open-source tool for hunting through Windows forensic artefacts

Chainsaw is an open-source first-response tool for quickly detecting threats in Windows forensic artefacts, including Event Logs and the MFT file. It enables fast keyword searches through event logs and identifies threats using built-in Sigma ...

Time for a change: Elevating developers’ security skills

Organizations don’t know their software engineers’ security skills because they don’t assess them in the interview process. Trying to do that in an interview is challenging, of course, given the time it takes for a proper assessment. ...