Application Security News and Articles


2024: A Year of Hyperproof Highlights, Innovations, and Milestones

As 2024 comes to a close, we at Hyperproof are reflecting on a year marked by remarkable progress and innovation. This year, we delivered exciting new features, expanded our global reach, and added powerful frameworks to help compliance teams ...

Attackers Can Find New APIs in 29 Seconds: Wallarm

Cybersecurity vendor Wallarm, using a honeypot, found that hackers can discover new APIs in 29 seconds and that APIs are now more targeted than web applications, highlighting the need to put a security focus on the increasingly popular business ...

Bits & Bytes: A Recap of AISS 2024

As a passionate cybersecurity enthusiast & a professional with ColorTokens, participating in the recently concluded 19th Annual Information Security Summit (AISS) 2024, organized by NASSCOM-DSCI, was an invaluable opportunity to immerse ...

Researchers reveal OT-specific malware in use and in development

Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient ...

Review of Blackhat EMEA 2024

A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut. The post Review of Blackhat EMEA 2024 appeared first on Security Boulevard.

Seamless API Threat Detection and Response: Integrating Salt Security and CrowdStrike NG-SIEM

APIs are essential for modern digital business operations, enabling smooth connectivity and data exchange between applications. However, the growing dependence on APIs has unintentionally widened the attack surface, making strong API security a ...

Malvertising on steroids serves Lumma infostealer

A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the ...

Cybersecurity Best Practices for Digital Nomads in Japan

Best cybersecurity tips for digital nomads in Japan: Keep your data safe, avoid cyber threats, and work securely from anywhere in Japan. The post Cybersecurity Best Practices for Digital Nomads in Japan appeared first on Security Boulevard.

Top 5 Cryptographic Key Protection Best Practices

We're sharing top 5 cryptographic key protection best practices. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Zimperium. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Security Boulevard.

RunSafe Security Platform enhances risk management with automation

RunSafe Security has released the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers can generate a high-fidelity software bill of materials (SBOM) at build time, ...

Arctic Wolf acquires BlackBerry’s Cylance endpoint security assets

Arctic Wolf and BlackBerry announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of ...

Kali Linux 2024.4 released! 14 new shiny tools added

Kali Linux 2024.4 includes a broad set of updates and changes. The summary of the changelog since the 2024.3 release from September: Python 3.12 – New default Python version (Au revoir pip, hello pipx). The end of the i386 kernel and images ...

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

Continuing our look back at 2024, part two of Last Watchdog’s year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and ...

The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing ...

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage madhav Tue, 12/17/2024 - 05:10 Cybersecurity is a remarkably dynamic industry. New trends, technologies, and techniques reshape the landscape at an ...

Balancing security and user experience to improve fraud prevention strategies

In this Help Net Security interview, Jennifer White, Senior Director for Banking and Payments Intelligence at J.D. Power, discusses how financial institutions can improve customer satisfaction during fraud resolution, covering proactive fraud ...

Cybersecurity jobs available right now: December 17, 2024

CISO ONE Security | Israel | Hybrid – View job details As a CISO, you will be responsible for overseeing information security, cybersecurity, application security, and business continuity strategies. The role involves implementing ...

FakeCaptcha scams—When the “I’m not a robot” button is a trap

How many times you’ve clicked the “I’m not a robot” CAPTCHA checkbox without a second thought? We’ve all done it … countless times. It’s such a familiar step that we don’t question it. And, cybercriminals have taken note of ...

An easy to follow NIST Compliance Checklist

We have seen how cyber attacks have disrupted organisations and businesses repeatedly. Mitigating emerging threats is crucial more than ever, and many organisations are at the forefront of combating them. One such organisation is the National ...

10 telltale signs of a fake giveaway on social media

Who wants a free phone or gift cards? Perhaps a free vacation? It’s easy to understand the allure of giveaways on social media. But here's the catch: not all giveaways are real. Fake giveaways are one of the many traps scammers use to steal ...