Application Security News and Articles


Ubuntu Patches Several Apache HTTP Server Vulnerabilities

Several security vulnerabilities were discovered in Apache HTTP server, which could lead to denial of service or exposure of sensitive information. Fortunately, they have been addressed in the new version and upgrading Apache HTTP server package ...

Lakera raises $20 million to secure GenAI applications

Lakera has raised $20 million in a Series A funding round. Led by European VC Atomico, with participation from Citi Ventures, Dropbox Ventures, and existing investors including redalpine, this investment brings Lakera’s total funding to $30 ...

PHP Vulnerability Used For Malware And DDOS Attacks

The cybercrime landscape has recently seen multiple threat actors exploiting a known PHP vulnerability. As per recent media reports, the vulnerability is exploited to deliver crypto miners, distributed denial-of-service (DDoS) botnets, and remote ...

Lessons Learned from the CrowdStrike Incident: Strengthening Organizational Resilience

On July 19, 2024, a major global digital catastrophe unfolded as a faulty Windows update led by cybersecurity firm CrowdStrike’s Falcon software caused widespread system crashes and service disruptions across vital sectors in over 20 countries. ...

BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements

BIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. BIND 9.20, a stable branch suitable for production use, has been released. According to the ...

How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than the Change Healthcare ...

Cloud security threats CISOs need to know about

In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, ...

Researchers expose GitHub Actions workflows as risky and exploitable

GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or ...

The most urgent security risks for GenAI users are all data-related

Regulated data (data that organizations have a legal duty to protect) makes up more than a third of the sensitive data being shared with GenAI applications—presenting a potential risk to businesses of costly data breaches, according to ...

KnowBe4 Unknowingly Hired Fake North Korean IT Worker

Cybersecurity company KnowBe4 unknowingly hired a North Korean operative who used a stolen identity and an AI-enhanced photo to get the software engineer job and then immediately began loading malware into the company's systems. The post KnowBe4 ...

The Future of Appsec is APIs | Impart Security

API security, microservices, decentralized applications, WAF, authentication, authorization, AI, security testing, response and enforcement, WAFs, security visibility, API exploitation The post The Future of Appsec is APIs | Impart Security ...

Guide your SOC Leaders to More Engineering Wisdom for Detection(Part 9)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. In this blog (#9 in the series), we will cover a few higher level elements for moving to detection ...

Securing Hugging Face Workloads on Kubernetes

In the rapidly evolving landscape of artificial intelligence (AI) and Large Language Models, the risk associated with implementing Generative AI […] The post Securing Hugging Face Workloads on Kubernetes appeared first on Security Boulevard.

USENIX Security ’23 – Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking

Authors/Presenters:Ilia Shevrin, Oded Margalit Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s ...

Are You Configured for Failure?

Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the cloud, making the system an ...

The Essential Role of Multi-Layered Defense and Role Based Access Control: OX Security’s Enhanced RBAC Functionality

Many debates have been started about where to put the first layer of defense in cybersecurity. Do you start at the network layer? At the data layer? On the endpoint? Around the application? The reality is that cybersecurity isn’t an ...

Securing Your Data Center Servers at the Component Level

As the operator of a large server fleet, your responsibility is to ensure the infrastructure running business-critical application workloads is secure and available. To this end, there are a number of security control frameworks and best ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #301 – Striking the Crowd

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Better Security and Performance For Free? Why PostgreSQL is Amazing

Upgrade your PostgreSQL instance to the newest version with confidence! In this benchmarking blog post, we show you the performance improvements you can expect when upgrading from PostgreSQL 13 to 16. The post Better Security and Performance For ...

Deploying AI/ML Workloads? GPU-Enabled Kubernetes Is the Right Fit

It seems like everyone is talking about artificial intelligence and machine learning (AI/ML) these days. As more organizations seek to incorporate AI and ML into their solutions, the need for processing power is growing rapidly. Graphics ...