Application Security News and Articles


Exposing the Rogue Cyberheaven Compromised Chrome VPN Extensions Ecosystem – An Analysis

Here we go. It appears that the individuals behind the successful compromise of the Cyberheaven VPN Chrome extensions are currently busy or at least have several other upcoming and in the works campaigns targeting several other vendors of Chrome ...

Freedom in Cybersecurity: Keys to Unlock Potential

How Does NHI Management Contribute to Unlocking Potential in Cybersecurity? As we navigate the complex world of cybersecurity, are we leveraging the full potential of Non-Human Identity (NHI) management? With evolving threats and increasingly ...

Scaling Your Security with Cloud-Native Practices

Are Your Current Security Measures Outpacing Your Growth? With the acceleration of digital transformation, security and scalability have risen to the top of the agenda for many organizations. As your business evolves, so too should your security ...

Capable Defenses: Mastering Least Privilege Tactics

Ambitious Targets: Are You Maximizing Your Capable Defenses? Amidst the accelerating pace of digital advancements, cybersecurity resilience continues to pose a significant challenge for businesses globally. Organizations often find themselves ...

Get Excited: Innovations in Privileged Access Mgmt

An Exciting Paradigm Shift in Managing Non-Human Identities Are we truly harnessing the power of Non-Human Identities (NHIs) in cybersecurity? A new wave of innovations in privileged access management has created an exciting shift in the ...

Reassured Safety with Advanced Threat Detection

Why is Advanced Threat Detection Crucial for Reassured Safety? Are you certain your organization’s assets are insulated against today’s unprecedented wave of cyber threats? Or are you in the majority struggling to bridge the widening gap ...

Best of 2024: FIDO: Consumers are Adopting Passkeys for Authentication

The FIDO Alliance found in a survey that as consumers become more familiar with passkeys, they are adopting the technology as a more secure alternative to passwords to authenticate their identities online. The post Best of 2024: FIDO: Consumers ...

CRITICAL ALERT: Sophisticated Google Domain Exploitation Chain Unleashed

by Source Defense A sophisticated attack chain targeting e-commerce payment flows has been prematurely exposed in a concerning development, highlighting the delicate balance between responsible disclosure and public safety. Discovered initially ...

“Out-of-the-Box” Detection Coverage: A Critical Metric for Endpoint Security

Register now: 2024 MITRE ATT&CK Enterprise Evaluation Result Breakdown Webinar. Back in the summer I wrote a blog around capability versus usability, in which I highlighted that typically industry testing focuses on capability, despite ...

A Happy, Prosperous & Safe New Year Wish For All

via Photographer Marjory Collins in New York City, NY, USA, January 1943, Blowing Horns on Bleeker Street, New Year's Day The post A Happy, Prosperous & Safe New Year Wish For All appeared first on Security Boulevard.

Key trends for 2025 Part I: Postquantum Cryptography

In 2025, postquantum cryptography (PQC) will drive major transformations in the PKI space, with announcements of PQC capabilities, adoption of quantum-safe Hardware Security Modules (HSMs), and standardized PQC algorithms in private PKI. ...

What Happened in the U.S. Department of the Treasury Breach? A Detailed Summary

The U.S. Department of the Treasury suffered a major security incident when a Chinese threat actor compromised its third-party cybersecurity service BeyondTrust. The attackers obtained an API key that allowed them to bypass security measures and ...

Why ISMS Policies Are Crucial for Compliance in Cybersecurity?

In 2025, the cybersecurity landscape will continue to evolve rapidly, driven by increasing cyber threats and technological advancements. As governments and regulatory bodies implement stricter cybersecurity regulations, businesses will face ...

OAuth Identity Attack — Are your Extensions Affected?

OAuth Identity Attack — Are your Extensions Affected? A malicious variant of Cyberhaven’s browser extension (v24.10.4) was uploaded to the Chrome Store on Christmas Day. According to Cyberhaven, this compromised version can allow ...

Shining Moments for NSFOCUS DDoS Defense in 2024

January – Release of the 2023 Global DDoS Landscape Report In the 2023 Global DDoS Landscape Report, NSFOCUS proposed important insights on global DDoS threats. DDoS attacks have become an indispensable weapon in cyber warfare, attackers are ...

Safeguarding Executives in the Digital World

Nisos Safeguarding Executives in the Digital World It takes a combination of people and technology to attribute and solve executive protection problems and drive real-world consequences... The post Safeguarding Executives in the Digital World ...

Basic Configuration of SAST and DAST for Django in GitLab CI/CD: A Quick Guide

Today, I’ll walk you through the basic setup of SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing)…Continue reading on rootops »

Strobes Security 2024: Year in Review

2024 has been a year of bold moves and big wins at Strobes Security. From launching game-changing innovations to expanding globally, we’ve made strides to reshape cybersecurity for the better.... The post Strobes Security 2024: Year in Review ...

Top CVEs & Vulnerabilities of December 2024

When it comes to cybersecurity, it’s not just the technology that evolves, it’s the threats too. Every month brings its own set of challenges, and December 2024 has been no... The post Top CVEs & Vulnerabilities of December 2024 appeared ...

Top Data Breaches in December 2024

December 2024 wrapped up the year with a chilling reminder of how vulnerable we all are to data breaches. From personal information to corporate secrets, it seemed like no one... The post Top Data Breaches in December 2024 appeared first on ...