Application Security News and Articles


DEF CON 32 – Where’s The Money-Defeating ATM Disk Encryption

Authors/Presenters: Matt Burch Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Future of Identity Protection: Real-Time Threats and Scams

In today’s digital landscape, protecting your identity from real-time threats is more critical than ever. As a cybersecurity expert, I’ve seen an evolving spectrum of threats that go far beyond traditional identity theft. From classic dark ...

Week in review: Windows Themes spoofing bug “returns”, employees phished via Microsoft Teams

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patching problems: The “return” of a Windows Themes spoofing vulnerability Despite two patching attempts, a security issue that may allow ...

DEF CON 32 – On Your Ocean’s 11 Team, I’m The AI Guy (Technically Girl)

Authors/Presenters:Harriet Farlow Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

How Can FSOs Help with CMMC Compliance?

As of now, the final rule for the Cybersecurity Maturity Model Certification has been published. The clock is ticking for organizations to make the changes they need to make, adhere to the multi-phase schedule required to achieve certification, ...

IoT Security Failures Can Be Sh*tty

It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different.  The Register reported that in Moscow a skyscraper-high plume of sewage had erupted, with speculation that Ukrainian hackers ...

DEF CON 32 – Welcome to DEF CON 32

Authors/Presenters: The Dark Tangent Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

GreyNoise: AI’s Central Role in Detecting Security Flaws in IoT Devices

GreyNoise Intelligence researchers said proprietary internal AI-based tools allowed them to detect and identify two vulnerabilities in IoT live-stream cameras that traditional cybersecurity technologies would not have been able to discover. The ...

October Recap: New AWS Sensitive Permissions and Services

As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in October 2024. Our intention in ...

Cybersecurity Vulnerability News: October 2024 CVE Roundup

Keep Your Organization Safe with Up-to-Date CVE Information   Cybersecurity vulnerability warnings from the National Institute of Standards and Technology (NIST) continue to identify critical concerns. If not promptly addressed, your ...

Stop Supply Chain Invaders

The post Stop Supply Chain Invaders appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Stop Supply Chain Invaders appeared first on Security Boulevard.

Getting the Gist of CJIS – 5.9.5

What’s New in CJIS 5.9.5 as it Relates to Firmware Security? n the latest CJIS Security Policy, the FBI is now requiring that IT firmware be verified for integrity and monitored for unauthorized changes. Failure to comply with it can lead to ...

Law enforcement doxxing raises risk profile for threat actors

In Q3 2024 Law enforcement actions disrupted infrastructure and publicized the identity of several prolific ransomware threat actors The post Law enforcement doxxing raises risk profile for threat actors appeared first on Security Boulevard.

Why Supply Chain Security Demands Focus on Hardware

Supply chain security for servers, PCs, laptops, and devices has correctly focused on protecting these systems from vulnerabilities introduced through third-party suppliers. The applicable supply chains range from design and manufacturing to ...

ATT&CK v16: Worry-Free Updates in Tidal Cyber

We are thrilled to share that we have migrated Tidal Cyber’s Community & Enterprise platforms to v16 of MITRE ATT&CK® the day following the new version’s release! Users of ATT&CK know the anxiety that accompanies the release of ...

Microsoft’s Controversial Recall Feature Release Delayed Again

Microsoft is again delaying the release of its controversial Recall feature for new Windows Copilot+ PCs until December to get new security capabilities in place and hopefully avoid the industry backlash it faced when first introducing the tool ...

Randall Munroe’s XKCD ‘Wells’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Wells’ appeared first on Security Boulevard.

Ô! China Hacks Canada too, Says CCCS

Plus brillants exploits: Canadian Centre for Cyber Security fingers Chinese state sponsored hackers. The post Ô! China Hacks Canada too, Says CCCS appeared first on Security Boulevard.

DEF CON 32 – AppSec Village – Hacking Corporate Banking for Fun and Profit

Authors/Presenters:niks, Charles Waterhouse Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention ...