Application Security News and Articles


Apple fixes 2 zero-days exploited to breach macOS systems (CVE-2024-44309, CVE-2024-44308)

Apple has released emergency security updates for macOS Sequoia that fix two zero-day vulnerabilities (CVE-2024-44309, CVE-2024-44308) that “may have been actively exploited on Intel-based Mac systems”. About CVE-2024-44309 and ...

Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025

This blog shares Zimperium's 2025 mobile security trends and threat predictions. The post Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025 appeared first on Zimperium. The post Zimperium ...

ArmorCode unifies application security with infrastructure vulnerability management

ArmorCode announced the growth of its ASPM Platform with the ability to unify AppSec and infrastructure vulnerability management. The continued innovation of Risk-Based Vulnerability Management (RBVM) in ArmorCode empowers security teams to ...

Tanium Cloud Workloads provides visibility and protection for containerized environments

Tanium announced Tanium Cloud Workloads, providing real-time visibility and protection for containerized environments. Through image vulnerability scanning, container run-time inventory, rogue container identification, and Kubernetes policy ...

OpenText Cloud Editions 24.4 blends AI with secure data connectivity

OpenText unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work. This release delivers secure, AI-integrated solutions that ...

8 Security Risks Of Shared Email Accounts

Discover the 8 security risks of shared email accounts, from weak passwords to accountability issues. Learn how they compromise data and increase vulnerability in organizations. The post 8 Security Risks Of Shared Email Accounts appeared first on ...

Exabeam and Wiz join forces to improve cloud security

Exabeam coolaborates with with Wiz to provide organizations with improved threat detection, investigation, and response (TDIR) capabilities, ensuring a more secure and resilient cloud environment. With its open architecture the Exabeam New-Scale ...

Arkose Device ID detects suspicious activity patterns

Arkose Labs launched Arkose Device ID, a device identification solution that raises the bar in fraud detection by combining precise device tracking with session-based risk signals and anti-spoofing technology. Arkose Device ID is designed to ...

Yubico Enrollment Suite boosts security for Microsoft users

Yubico announced Yubico Enrollment Suite for Microsoft users, including Yubico FIDO Pre-reg and the new YubiEnroll. These solutions integrate with Microsoft’s Entra ID, helping organizations create stronger cyber resilience and provide support ...

Introducing DKIM2: The Future of Email Security

DKIM is set for an upgrade. DKIM2 promises to enhance email security, addressing the limitations of its predecessor. The post Introducing DKIM2: The Future of Email Security appeared first on Security Boulevard.

Five backup lessons learned from the UnitedHealth ransomware attack

The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony, lawmaker scrutiny and potential legislation.  Over the past few months, ...

Debunking myths about open-source security

In this Help Net Security interview, Stephanie Domas, CISO at Canonical, discusses common misconceptions about open-source security and how the community can work to dispel them. She explains how open-source solutions, contrary to myths, offer ...

Safeguarding the DNS through registries

The integrity of our online ecosystem heavily relies on domain registries, which serve as the foundation for secure and trusted digital experiences. However, threats like Domain Name System (DNS) abuse– manifesting as phishing, malware, and ...

Cybersecurity jobs available right now: November 20, 2024

Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission, or disclosure of sensitive data, ...

Overreliance on GenAI to develop software compromises security

GenAI is quickly changing the software development process by automating tasks that once took developers hours, if not days, to complete, bolstering efficiency and productivity, according to Legit Security. “As GenAI transforms software ...

5-Star Fraud: The FTC’s Ban on Fake Reviews

The FTC’s new rule takes aim at the rising threat of fake reviews, especially those generated by bots, which can manipulate consumer trust and distort competition. The post 5-Star Fraud: The FTC’s Ban on Fake Reviews appeared first on ...

Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence

The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary “Secure by Design Pledge” for enterprise software manufacturers, focusing on improving the security of their products and services. This pledge outlines ...

EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems

The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had "critical" or "high-risk" security flaws and another 211 had less dangerous vulnerabilities, risking threats from stolen data to disrupted service. The ...

DEF CON 32 – Breaching AWS Through Shadow Resources

Authors/Presenters: Yakir Kadkoda, Michael Katchinskiy, Ofek Itach Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las ...

Microsoft announces Zero Day Quest hacking event with big rewards

Microsoft is enhancing its bug bounty initiatives with the launch of the Zero Day Quest hacking event. With $4 million in potential rewards, it focuses on driving research in critical areas such as cloud computing and AI. Event focus The event ...