Application Security News and Articles


How to use your Robots.txt to (even partially) block Bots from crawling your site

Prevent search engine bots from crawling restricted sections of your site. Learn how to block web crawlers effectively using your robots.txt. The post How to use your Robots.txt to (even partially) block Bots from crawling your site appeared ...

Why Traditional Fraud Scores Are No Longer Enough for Modern Threats

Discover why traditional fraud scores fall short in today's threat landscape and learn how advanced solutions like DataDome deliver superior fraud prevention. The post Why Traditional Fraud Scores Are No Longer Enough for Modern Threats appeared ...

Brokers Key to Strengthening American Businesses’ Cyber Defenses

American businesses are increasingly turning to their brokers for more than financial protection, and also seek guidance, expertise and support to strengthen their cyber defenses.  The post Brokers Key to Strengthening American Businesses’ ...

Beware the Rise of the Autonomous Cyber Attacker  

AI’s growing sophistication signals a future in which networks can be compromised autonomously, and the industry must prepare for this near-term reality.  The post Beware the Rise of the Autonomous Cyber Attacker   appeared first on Security ...

Dark Web Dangers Aren’t as Hidden as You Think

While it occupies only a sliver of the internet, the dark web has become a growing threat to businesses everywhere. The post Dark Web Dangers Aren’t as Hidden as You Think appeared first on Security Boulevard.

Making the most of cryptography, now and in the future

Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is ...

Session Hijacking: How It Works and Prevention

Logging into websites or online portals is a daily activity for many. Each time you log in, a session is established, a simple communication channel between two systems. This session remains active until the user decides to end it, making it a ...

eBay CISO on managing long-term cybersecurity planning and ROI

In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, ...

Cyberbro: Open-source tool extracts IoCs and checks their reputation

Cyberbro is an open-source application that extracts IoCs from garbage input and checks their reputation using multiple services. Cyberbro features Input handling: Paste raw logs, IoCs, or fanged IoCs, and let the regex parser do the rest. ...

Open source worldwide: Critical maintenance gaps exposed

Lineaje recently released a report identifying the US and Russia as the leading generators of open-source projects, with both countries also having the highest numbers of anonymous open-source contributions. In this Help Net Security video, Nick ...

How AI and deepfakes are redefining social engineering threats

This article presents key insights from 2024 reports on the rise of phishing attacks, focusing on how advancements in AI and deepfake technology are making social engineering tactics more sophisticated. Cybercriminals exploit file sharing ...

Two Clicks to Chaos: How Double-clickjacking Hands Over Control of Apps without Users Knowing

In our last blog, we discussed how OAuth-based consent phishing attacks have been used to trick users into giving malicious apps the permission to conduct malicious activities via an employee’s account. This attack has been extremely effective ...

Windows LDAP Denial of Service Vulnerability (CVE-2024-49113) Alert

Overview Recently, NSFOCUS CERT detected that the details of Windows LDAP remote code execution vulnerability (CVE-2024-49113) were disclosed. Due to an out-of-bounds read vulnerability in wldap32.dll of Windows LDAP service, an unauthenticated ...

How eBPF is changing appsec | Impart Security

What happens when cutting-edge technology meets the reality of securing modern applications? That’s the question our expert panel tackled in this conversation on how eBPF is reshaping application security. Moderated by Katie Norton of IDC, the ...

Effective Strategies for Secrets Vaulting

Why is Secrets Vaulting Integral to Secure Cloud Environments? Have you thought about just how secure your cloud environment truly is? For professionals spanning across industries from financial services to healthcare, the urgency to protect ...

Best Practices for Automated Secrets Rotation

Why Automating Secrets Rotation Matters in Cybersecurity? One such moving goalpost is Secrets rotation, an essential cybersecurity staple. So, what’s the big deal about automating this process? Understanding Secrets Rotation Let’s frame the ...

Ensuring Compliance in Cloud-Native Applications

Why is Compliance Crucial for Cloud-Native Applications? Cloud-native applications have become a staple in modern business environments. But have you ever pondered the fundamental role compliance plays in these applications? A core component of ...

Poor Cyber Hygiene can Cost Organizations up to an Average of $677 Million 

Knowing that insider threats and poor cyber hygiene are well-known as some of the worst threat vectors, prioritizing security controls that can keep pace with modern threats is fundamental for all organizations moving forward.  The post Poor ...

Online Marketplaces: Helping Small Businesses Grow and Stay Cyber Safe 

Online marketplace sales are projected to reach $3.832 trillion in 2024. Every small e-commerce business should capture market share. The post Online Marketplaces: Helping Small Businesses Grow and Stay Cyber Safe  appeared first on Security ...

Balancing proprietary and open-source tools in cyber threat research

In this Help Net Security interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses how threat research drives faster, better decision-making in cybersecurity operations. Roccia provides insights into balancing internal and ...