Application Security News and Articles


Contrast One: Managed Application Security (AppSec) Platform | Contrast Security

As a Contrast Security customer you already have the best-in-class security platform for applications and application programming interfaces (APIs). With Contrast, you can rest easy knowing you have fewer vulnerabilities and you can catch attacks ...

Managing Risks: Executive Protection in the Digital Age

The recent incident involving the United Healthcare CEO has sparked critical conversations in corporate boardrooms about the evolving threat landscape and the importance of robust security measures centered around executive protection. The ...

Staying Secure During the Holiday Shopping Season

The post Staying Secure During the Holiday Shopping Season appeared first on Votiro. The post Staying Secure During the Holiday Shopping Season appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Phase Change’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Phase Change’ appeared first on Security Boulevard.

DEF CON 32 – Feet Feud (Another Fascinating DEF CON Game Show)

Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. ...

Counterfeit ESLint and Node ‘types’ libraries downloaded thousands of times abuse Pastebin

The legitimate ESLint packages on the npmjs.com registry are called "typescript-eslint" and "@typescript-eslint/eslint-plugin." This has unscrupulous actors publishing a typosquat named "@typescript_eslinter/eslint" that very closely resembles ...

SaaS: The Next Big Attack Vector | Grip Security

Discover how SaaS creates a new attack vector, exposing organizations to breaches and data risks. Learn how to mitigate this growing cybersecurity threat. The post SaaS: The Next Big Attack Vector | Grip Security appeared first on Security Boulevard.

Identities Do Not Exist in a Vacuum: A View on Understanding Non-Human Identities Governance

The future of eliminating secrets sprawl means getting a handle on the lifecycles and interdependencies of the non-human identities that rely on secrets. Learn how to implement these NHI security measures at scale. The post Identities Do Not ...

Understanding NIS2: Essential and Important Entities

NIS 2 aims to enhance the security of networks and information systems in the EU. Its main goal is to level up the cybersecurity game across Europe. It requires organisations in critical sectors to take cybersecurity seriously. The transposition ...

NIS2 Penetration Testing and Compliance

Every day, we hear about security threats and attacks on organisations. These threats can range from ransomware and data breaches to leakage of sensitive data. There is no denying that cyber threats have been on the rise, and many organisations ...

A new playground: Malicious campaigns proliferate from VSCode to npm

ReversingLabs researchers have been monitoring multiple public repositories over the past few years. Recently, our team has expanded its threat hunting efforts to VSCode Marketplace — and the researchers started to see an increasing amount of ...

European companies hit with effective DocuSign-themed phishing emails

A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The ...

BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)

BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products that may allow remote code execution, and is urging organizations with on-premise ...

Appdome protects applications running on mobile-enabled platforms

Appdome announced that the Appdome Mobile Defense Platform now protects applications running on mobile-enabled platforms like Apple macOS, Apple visionOS, Meta Quest, HarmonyOS Next, Android Auto, Apple CarPlay, Android TV, Apple TV, and Google ...

The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them

Remember, there is no free lunch with AI. The upsides are tremendous, but security cannot be an afterthought. The post The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them appeared first on Security Boulevard.

Stairwell Core boosts threat intelligence for security teams

Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible ...

4 Ways To Unleash Speed and Efficiency in the SOC

With the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. The post 4 Ways To Unleash Speed and Efficiency in the SOC appeared first on Security ...

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

Today, part three of Last Watchdog’s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, ...

5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year

A CLM policy also puts you in the best position to mitigate and prevent cyberthreats, including man-in-the-middle attacks and phishing scams. The post 5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year appeared first ...

GitGuardian launches multi-vault integration to combat secrets sprawl

GitGuardian unveiled a comprehensive Non-Human Identity (NHI) security strategy with integrations across major secrets management platforms, addressing the growing challenge of secrets sprawl in enterprise environments. With Non-Human ...