Application Security News and Articles


Session Hijacking: How It Works and Prevention

Logging into websites or online portals is a daily activity for many. Each time you log in, a session is established, a simple communication channel between two systems. This session remains active until the user decides to end it, making it a ...

eBay CISO on managing long-term cybersecurity planning and ROI

In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning with immediate threat response, evaluating the ROI of new technologies, ...

Cyberbro: Open-source tool extracts IoCs and checks their reputation

Cyberbro is an open-source application that extracts IoCs from garbage input and checks their reputation using multiple services. Cyberbro features Input handling: Paste raw logs, IoCs, or fanged IoCs, and let the regex parser do the rest. ...

Open source worldwide: Critical maintenance gaps exposed

Lineaje recently released a report identifying the US and Russia as the leading generators of open-source projects, with both countries also having the highest numbers of anonymous open-source contributions. In this Help Net Security video, Nick ...

How AI and deepfakes are redefining social engineering threats

This article presents key insights from 2024 reports on the rise of phishing attacks, focusing on how advancements in AI and deepfake technology are making social engineering tactics more sophisticated. Cybercriminals exploit file sharing ...

Two Clicks to Chaos: How Double-clickjacking Hands Over Control of Apps without Users Knowing

In our last blog, we discussed how OAuth-based consent phishing attacks have been used to trick users into giving malicious apps the permission to conduct malicious activities via an employee’s account. This attack has been extremely effective ...

Windows LDAP Denial of Service Vulnerability (CVE-2024-49113) Alert

Overview Recently, NSFOCUS CERT detected that the details of Windows LDAP remote code execution vulnerability (CVE-2024-49113) were disclosed. Due to an out-of-bounds read vulnerability in wldap32.dll of Windows LDAP service, an unauthenticated ...

How eBPF is changing appsec | Impart Security

What happens when cutting-edge technology meets the reality of securing modern applications? That’s the question our expert panel tackled in this conversation on how eBPF is reshaping application security. Moderated by Katie Norton of IDC, the ...

Effective Strategies for Secrets Vaulting

Why is Secrets Vaulting Integral to Secure Cloud Environments? Have you thought about just how secure your cloud environment truly is? For professionals spanning across industries from financial services to healthcare, the urgency to protect ...

Best Practices for Automated Secrets Rotation

Why Automating Secrets Rotation Matters in Cybersecurity? One such moving goalpost is Secrets rotation, an essential cybersecurity staple. So, what’s the big deal about automating this process? Understanding Secrets Rotation Let’s frame the ...

Ensuring Compliance in Cloud-Native Applications

Why is Compliance Crucial for Cloud-Native Applications? Cloud-native applications have become a staple in modern business environments. But have you ever pondered the fundamental role compliance plays in these applications? A core component of ...

Poor Cyber Hygiene can Cost Organizations up to an Average of $677 Million 

Knowing that insider threats and poor cyber hygiene are well-known as some of the worst threat vectors, prioritizing security controls that can keep pace with modern threats is fundamental for all organizations moving forward.  The post Poor ...

Online Marketplaces: Helping Small Businesses Grow and Stay Cyber Safe 

Online marketplace sales are projected to reach $3.832 trillion in 2024. Every small e-commerce business should capture market share. The post Online Marketplaces: Helping Small Businesses Grow and Stay Cyber Safe  appeared first on Security ...

Balancing proprietary and open-source tools in cyber threat research

In this Help Net Security interview, Thomas Roccia, Senior Security Researcher at Microsoft, discusses how threat research drives faster, better decision-making in cybersecurity operations. Roccia provides insights into balancing internal and ...

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety

Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises. Plus, in our ‘Aware Much’ segment, ...

Only 26% of Europe’s top companies earn a high rating for cybersecurity

With the EU’s Digital Operational Resilience Act (DORA) deadline approaching on 17th January, 2025, Europe’s top 100 companies face an urgent cybersecurity challenge, according to SecurityScorecard. A-rated companies safer from breaches The ...

Users receive at least one advanced phishing link every week

Phishing remains one of the most significant cyber threats impacting organizations worldwide, according to SlashNext. Credential phishing is raising Credential theft attacks surged dramatically in the second half of 2024 (703%), signaling a sharp ...

Is healthcare cybersecurity in critical condition?

This article highlights key findings and trends in healthcare cybersecurity for 2024. From the rising impact of cyberattacks on patient care to the vulnerabilities posed by medical devices and supply chains, these insights provide an overview of ...

Tenable Chairman and CEO Amit Yoran Has Died

It is with profound sadness that we share the news of the passing of our beloved CEO Amit Yoran on January 3. Amit was not only a visionary leader but also a guiding force who profoundly impacted our industry, our company, our culture and our ...

Feel Supported by Advanced Machine Identity Management

Why Does Machine Identity Management Matter? Why should advanced machine identity management be a key concern for CISOs? With rapid technological advancements and the increasing dependence on cloud environments, businesses are confronted with a ...