Application Security News and Articles


Randall Munroe’s XKCD ‘Time Capsule Instructions’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Time Capsule Instructions’ appeared first on Security Boulevard.

What is wrong with the current state of DAST? Feedback from my conversations with AppSec engineers

And a deep dive into how the state of DAST is changing. The post What is wrong with the current state of DAST? Feedback from my conversations with AppSec engineers appeared first on Security Boulevard.

DEF CON 32 – You Got A Lighter I Need To Do Some Electroporation

Authors/Presenters: J. Utley, P. Rhodes, J. Hill Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Clarification on Shor’s Algorithm and GNFS Comparison

Some of our astute readers noticed an apparent anomaly in the graph comparing the complexities of Shor’s algorithm and GNFS in the original blog. Specifically, it seemed as though GNFS (General Number Field Sieve) outperformed ...

Secret Scanning: Hazards of checking in sensitive information with code

In an increasingly interconnected digital world, safeguarding sensitive data is non-negotiable. Yet, a significant vulnerability often…Continue reading on Gauntlet Security »

Addressing PKI Management Pitfalls: From Chaos to Clarity

Effective Public Key Infrastructure (PKI) management needs to combine ways of handling PKI infrastructure along with the recommended best practices. In many cases, management of digital signatures or certificates is not that widely understood and ...

Best of 2024: So-Phish-ticated Attacks

August 27, 2024 Authors: Rui Ataide, Hermes Bojaxhi The GuidePoint Research and Intelligence Team (GRIT) has been tracking a highly […] The post Best of 2024: So-Phish-ticated Attacks appeared first on Security Boulevard.

What Is Threat Detection and Response (TDR)? A Guide

Cyberthreats are evolving fast, and staying ahead requires more than basic defenses. Threat detection and response (TDR) equips you to identify risks early and take action before they escalate. It’s a strategy for protecting your systems, ...

10 Best Security Code Review Tools to Improve Code Quality

Poor code quality can jeopardize your application’s performance and scalability. But more importantly, security vulnerabilities in code increase the risk of exploits, leading to data breaches, compliance failures, and loss of customer ...

What Is SAST? How It Works and the Best Tools

Securing applications from vulnerabilities starts with analyzing your source code before it becomes a problem. This is where static application security testing (SAST) steps in. The post What Is SAST? How It Works and the Best Tools appeared ...

What Is Encryption Key Management? Importance and Best Practices

Encryption is a powerful tool for safeguarding sensitive data, but its effectiveness hinges on proper security. Encryption keys are at the heart of any good security strategy—but without effective encryption key management, you might experience ...

What Is Software Composition Analysis (SCA)? Tools and Benefits

Modern software development uses open-source components to save time and resources. But with that efficiency comes security issues. Open-source code can carry vulnerabilities or licensing issues that put your software—and the sensitive data it ...

Magecart Attacks Surge as E-Commerce Security Struggles to Keep Pace

by Source Defense A new report by Recorded Future’s Insikt Group reveals a concerning rise in Magecart attacks and e-skimming activity targeting online retailers. The research highlights how cybercriminals are evolving their tactics to bypass ...

Adopt a Personal Safety Plan Outside of Work

Digital security and personal safety go hand in hand. We believe that adopting a comprehensive personal safety plan outside of work is crucial for protecting yourself from potential threats. Here are some essential steps to enhance your personal ...

Consent Phishing: The New, Smarter Way to Phish

What is consent phishing? Most people are familiar with the two most common types of phishing — credential phishing and phishing payloads, where attackers trick users into revealing credentials and downloading malicious software ...

The Critical Risk of Using Dummy Email Domains in Payment Gateways

During our recent security assessments across multiple clients, we discovered a concerning pattern: many companies are unknowingly exposing their customers’ sensitive payment information through a simple yet critical misconfiguration in... The ...

The modern CISO is a cornerstone of organizational success

The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a role that bridges business strategy, operational efficiency, and cybersecurity. The post The modern CISO ...

Best practices for ensuring a secure browsing environment

In this Help Net Security interview, Devin Ertel, CISO at Menlo Security, discusses how innovations like AI and closer collaboration between browser vendors and security providers will shape the future of browser security. The post Best practices ...

Every minute, 4,080 records are compromised in data breaches

A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and uncovers signs that AI may be unseating digital juggernauts as it brings in new forms of engagement. “The phenomenal ...

Deepfakes question our ability to discern reality

As deepfakes become increasingly sophisticated and accessible, their potential for misuse in areas such as cybercrime, misinformation campaigns, and identity theft continues to grow. In this article, you will find key insights from 2024 reports ...