Application Security News and Articles


End-of-Year PTO: Days Off and Data Exfiltration with Formbook

The holiday season is a time of joy and relaxation, but it often brings an influx of corporate emails ranging from leave approvals to scheduling paid time off. The Cofense Phishing Defense Center (PDC) has recently intercepted a malicious ...

End-of-Year PTO: Days Off and Data Exfiltration with Formbook

The holiday season is a time of joy and relaxation, but it often brings an influx of corporate emails ranging from leave approvals to scheduling paid time off. The Cofense Phishing Defense Center (PDC) has recently intercepted a malicious ...

Teenagers leading new wave of cybercrime

Global data breaches show no signs of slowing down as this year has already exceeded 2023 in the number of data breaches and consumers impacted, according to Experian. Younger cybercriminals on the rise Today, the world of cyber hacking is not ...

PowerDMARC Named G2 Leader in DMARC Software for the 4th Time in 2024

PowerDMARC is recognized as a G2 Leader in DMARC Software for the fourth time in 2024, reflecting our commitment to innovation and customer satisfaction in email security. The post PowerDMARC Named G2 Leader in DMARC Software for the 4th Time in ...

Building a robust security posture with limited resources

In this Help Net Security interview, Gareth Lindahl-Wise, CISO at Ontinue, discusses how business leaders can align innovation with cybersecurity, tackle the risks posed by legacy systems, and build defenses for startups. Lindahl-Wise also ...

GenAI makes phishing attacks more believable and cost-effective

GenAI is a powerful tool that can be used by security teams to protect organizations, however, it can also be used by malicious actors, making phishing-related attacks a growing and concerning threat vector, according to Ivanti. Ivanti’s ...

New infosec products of the week: December 6, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Datadog, Fortinet, Radiant Logic, Sweet Security, Tenable, and Veza. FortiAppSec Cloud simplifies web application security management With FortiAppSec ...

NSFOCUS’s Coogo: An Automated Penetration Testing Tool

The video above demonstrates an automated penetration test in a simple container escape scenario. In this video, in addition to using NSFOCUS’s open-source cloud-native cyber range software Metarget (for quickly and automatically building ...

News alert: One Identity wins 2024 Cyber Defense Award: Hot Company – PAM category

Alisa Viejo, Calif., Dec. 5, 2024, CyberNewswire — One Identity proudly announces it has been named a winner in the Hot Company: Privileged Access Management (PAM) category in the 12th annual Cyber Defense Awards by Cyber Defense Magazine ...

10 Tips to Enhance Data Center Sustainability with DCIM Software

consumption and carbon emissions. Sustainability is now a critical priority for organizations striving to balance operational efficiency with environmental responsibility. Data Center Infrastructure Management (DCIM) software provides advanced ...

How to Implement Least Privilege to Protect Your Data

Why is the Concept of Least Privilege Vital in Data Protection? Considering the escalating cybersecurity threats in our digital world, the question of how to implement least privilege to protect your data is becoming essentially crucial. With the ...

Top Techniques to Enhance Secrets Security in the Cloud

Are You Optimally Securing Your Non-Human Identities and Their Secrets? In the evolving landscape of cybersecurity, Non-Human Identities (NHIs) and secrets security management often becomes obscured amidst a variety of challenges. Did you know, ...

Navigating Firewall Security Policy Challenges in Technology Organizations: How FireMon Simplifies Complexity

In the technology sector, innovation and agility are key drivers of success. Organizations in this field lead the charge in adopting cutting-edge architectures like hybrid clouds, microservices, and DevSecOps practices.... The post Navigating ...

AI Security Governance Insights from Security Leaders

The post AI Security Governance Insights from Security Leaders appeared first on AI-Enhanced Security Automation. The post AI Security Governance Insights from Security Leaders appeared first on Security Boulevard.

Cisco and Rittal Asset Discovery Enhancement

Product Update: Version 4.7 Our latest software release delivers a major upgrade for Cisco and Rittal asset discovery. Enjoy improved detection and tracking of power data in Cisco switches and enhanced environmental sensor recognition in the ...

Demystifying VEX: Simplifying SBOMs with Sonatype SBOM Manager

Ever wondered what VEX really is and why it's crucial for your software supply chain? You're not alone. The post Demystifying VEX: Simplifying SBOMs with Sonatype SBOM Manager appeared first on Security Boulevard.

The 7 Stages of Realizing You Have a Bot Problem

Bots are sneaky, and the signs of a problem are hard to ignore—rising fraud, compromised accounts, and vanishing promotions. Below are seven emotional stages of realizing your bot detection isn’t working and how Kasada can help. The post The ...

DEF CON 32 – Bug Hunting In VMware Device Virtualization

Authors/Presenters: JiaQing Huang, Hao Zheng, Yue Liu Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Credit Union in U.S. South Supercharges Takedown Campaigns

Do-It-Yourself Takedown Struggles A credit union based in the southern United States supports nearly 28,000 members with total assets of $530M from their headquarters in Alexandria, VA. For a credit union of this size, brand impersonation attacks ...

One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

Alisa Viejo, California, 5th December 2024, CyberNewsWire The post One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024 appeared first on Security Boulevard.