Application Security News and Articles


Cutting Through the Noise: Chariot’s Zero False Positive Guarantee

For years, cybersecurity teams have fought a persistent battle: overwhelming noise generated by vulnerability tools. It’s a familiar scenario – overtaxed security teams drowning in alerts, many leading to false positives or low-priority ...

Cybersecurity Insights with Contrast CISO David Lindner | 11/1/24

Insight #1:  You can be sued for your junky software, EU says The EU recently updated its Product Liability Directive (PDF) to reflect the critical role of software in modern society. This means software vendors are now liable for defects that ...

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data ...

Shared Intel Q&A: Foreign adversaries now using ‘troll factories’ to destroy trust in U.S. elections

Foreign adversaries proactively interfering in U.S. presidential elections is nothing new. Related: Targeting falsehoods at US minorities, US veterans It’s well-documented how Russian intelligence operatives proactively meddled with the U.S. ...

CISA Strategic Plan Targets Global Cooperation on Cybersecurity

The Cybersecurity and Infrastructure Security Agency (CISA) introduced its inaugural international strategic plan, a roadmap for strengthening global partnerships against cyber threats. The post CISA Strategic Plan Targets Global Cooperation on ...

50% of financial orgs have high-severity security flaws in their apps

Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt, according to Veracode. ...

How open-source MDM solutions simplify cross-platform device management

In this Help Net Security interview, Mike McNeil, CEO at Fleet, talks about the security risks posed by unmanaged mobile devices and how mobile device management (MDM) solutions help address them. He also discusses employee resistance to MDM and ...

OpenPaX: Open-source kernel patch that mitigates memory safety errors

OpenPaX is an open-source kernel patch that mitigates common memory safety errors, re-hardening systems against application-level memory safety attacks using a simple Linux kernel patch. It’s available under the same GPLv2 license terms as ...

Threat actors are stepping up their tactics to bypass email protections

Although most organizations use emails with built-in security features that filter out suspicious messages, criminals always find a way to bypass these systems. With the development of AI technology, phishing is becoming increasingly difficult to ...

Infosec products of the month: October 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, Fastly, Frontegg, GitGuardian, IBM, Ivanti, Jumio, Kusari, Legit ...

How Doppler aligns with your SPACE framework

What is the SPACE Framework? See how Doppler’s features improve your team’s wellbeing, efficiency, and secrets management posture The post How Doppler aligns with your SPACE framework appeared first on Security Boulevard.

Maestro

Maestro: Abusing Intune for Lateral Movement Over C2 If I have a command and control (C2) agent on an Intune admin’s workstation, I should just be able to use their privileges to execute a script or application on an Intune-enrolled ...

Leading the Way in API Security: Which U.S. States Are Setting the Standard?

With just days to go before the U.S. election, securing our digital landscape is more critical than ever. Our latest infographic, Vote for API Security: Which States Are Leading the Charge?, provides an in-depth analysis of state-by-state API ...

UnitedHealth Hires Longtime Cybersecurity Executive as CISO

UnitedHealth Group, which is still picking up the pieces after a massive ransomware attack that affected more than 100 million people, hired a new and experienced CISO to replace the previous executive who became a target of lawmakers for having ...

CVE-2024-43573 – Microsoft Windows Security Vulnerability – October 2024

A critical vulnerability (CVE-2024-43573) in Microsoft Windows MSHTML platform allows for spoofing attacks.  Affected Platform  The vulnerability identified as CVE-2024-43573 affects Microsoft Windows systems, specifically within the MSHTML ...

Why Data Discovery and Classification are Important

What is data discovery and classification? Let's answer that and look at how your organization can improve its data protection program. The post Why Data Discovery and Classification are Important appeared first on Security Boulevard.

Automate Playbook Development with Ace AI

Simplify and accelerate SOAR playbook development with Ace AI. Generate robust, ready-to-use playbooks tailored to your SOC. The post Automate Playbook Development with Ace AI appeared first on D3 Security. The post Automate Playbook Development ...

DEF CON 32 – AppSec Village – Fine Grained Authorisation with Relationship Based Access Contro

DEF CON 32 - AppSec Village - DEF CON 32 - Fine Grained Authorisation with Relationship Based Access Control Authors/Presenters:Ben Dechrai Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 ...

Key Takeaways from the Cyber Security Summit in Minnesota: AI, Data Security and MSSP Differentiation

The 14th Annual Cyber Security Summit in Minneapolis proved invaluable, gathering experts from government, law enforcement and various industries to discuss the future of cybersecurity under this year’s theme, All In for Next. Over three days, ...

Lateral Movement in Recent Cybersecurity Breaches

Highlighting two recent cybersecurity breaches to study lateral movement Lateral movement is significant threat to all organization, from small startups to large multinational corporations. This tactic allows cybercriminals to move through a ...