Application Security News and Articles


The year in ransomware: Security lessons to help you stay one step ahead

Operation Cronos, a Europol-led coalition of law enforcement agencies from 10 countries, announced in February that it had disrupted LockBit — one of the most prolific ransomware gangs in the world — at “every level” of its operations. ...

CISA orders federal agencies to secure their Microsoft cloud environments

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The ...

CISA Mandates Federal Agencies Secure Their Cloud Environments

CISA is requiring all federal agencies to adopt stronger measures to improve their SaaS configurations and protect their complex cloud environments against growing threats from hackers, who are increasingly targeting third parties like cloud ...

SASE Market Hits $2.4 Billion, Top Vendors Tighten Market Share Grip 

The global Secure Access Service Edge (SASE) market reached $2.4 billion in the third quarter of 2024, with six leading vendors — Zscaler, Cisco, Palo Alto Networks, Broadcom, Fortinet and Netskope — capturing a combined 72% market ...

The key to growing a cybersecurity career are soft skills

Season 3, Episode 16: Being technical gets you a job in cyber, but investing in soft skills opens doors to make it a career. The post The key to growing a cybersecurity career are soft skills appeared first on Security Boulevard.

Legit Security provides insights into the enterprise’s secrets posture

Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery ...

How to Leverage the FAIR Model with the NIST CSF

In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and measuring risk that it makes it difficult to pin any one thing down, ...

What is a Compromised Credentials Attack? 

The education industry is among the most highly targeted of all sectors. K-12 schools are particularly at risk, given the vast amount of sensitive information they hold. Out of all forms of cyberattacks, compromised credentials attacks are among ...

Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs

In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as you'll see below). By the end of the ...

NYDOH Cybersecurity Regulations: What Healthcare Providers Need to Know in 2025

10 NYCRR 405.46: NY’s New Hospital Cyber Regulation  Hospitals are no strangers to health data privacy laws like HIPAA. But New York’s new cybersecurity regulations take things to the next level. Finalized by the New York State Department of ...

Ukrainian hacker gets prison for infostealer operations

Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service ...

Netwrix 1Secure enhances protection against data and identity access risks

Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome ...

NetSPI introduces external attack surface management solutions

NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous ...

The Best Mimecast DMARC Analyzer Alternatives and Competitors

Check out the list of top 10 Mimecast Dmarc analyzer alternatives. Find the best solution for your email security by considering their pros & cons & pricing. The post The Best Mimecast DMARC Analyzer Alternatives and Competitors appeared ...

Ataccama ONE platform enhancements accelerate enterprise data quality initiatives

Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its ...

Enpass simplifies compliance and security controls for password management

Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further ...

Turning Insights into Action: The Importance of Vulnerability Remediation after VAPT

Vulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing ...

2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite

By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive. The post 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite appeared first on Security ...

Understanding Virtual Skimmers: A Threat to E-Commerce Security 

Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late. The post Understanding Virtual Skimmers: A Threat to E-Commerce Security  appeared first on Security Boulevard.

Acumen Threat Analysis: Preparing for 2025 

Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned ...