Application Security News and Articles
Operation Cronos, a Europol-led coalition of law enforcement agencies from 10 countries, announced in February that it had disrupted LockBit — one of the most prolific ransomware gangs in the world — at “every level” of its operations. ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The ...
CISA is requiring all federal agencies to adopt stronger measures to improve their SaaS configurations and protect their complex cloud environments against growing threats from hackers, who are increasingly targeting third parties like cloud ...
The global Secure Access Service Edge (SASE) market reached $2.4 billion in the third quarter of 2024, with six leading vendors — Zscaler, Cisco, Palo Alto Networks, Broadcom, Fortinet and Netskope — capturing a combined 72% market ...
Season 3, Episode 16: Being technical gets you a job in cyber, but investing in soft skills opens doors to make it a career.
The post The key to growing a cybersecurity career are soft skills appeared first on Security Boulevard.
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery ...
In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and measuring risk that it makes it difficult to pin any one thing down, ...
The education industry is among the most highly targeted of all sectors. K-12 schools are particularly at risk, given the vast amount of sensitive information they hold. Out of all forms of cyberattacks, compromised credentials attacks are among ...
In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as you'll see below). By the end of the ...
10 NYCRR 405.46: NY’s New Hospital Cyber Regulation Hospitals are no strangers to health data privacy laws like HIPAA. But New York’s new cybersecurity regulations take things to the next level. Finalized by the New York State Department of ...
Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service ...
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome ...
NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous ...
Check out the list of top 10 Mimecast Dmarc analyzer alternatives. Find the best solution for your email security by considering their pros & cons & pricing.
The post The Best Mimecast DMARC Analyzer Alternatives and Competitors appeared ...
Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its ...
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further ...
Vulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing ...
By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive.
The post 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite appeared first on Security ...
Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late.
The post Understanding Virtual Skimmers: A Threat to E-Commerce Security appeared first on Security Boulevard.
Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned ...