Application Security News and Articles


How companies can address bias and privacy challenges in AI models

In this Help Net Security interview, Emre Kazim, Co-CEO of Holistic AI, discusses the need for companies to integrate responsible AI practices into their business strategies from the start. He explores how addressing issues like bias, privacy, ...

Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption

In Episode 359 of the Shared Security Podcast, the team examines a shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, potentially involving corporate sponsorship by ExxonMobil. They explore the ...

Trapster Community: Open-source, low-interaction honeypot

Trapster Community is an open-source, lightweight, low-interaction honeypot designed for deployment within internal networks. It enhances network security by creating a deceptive layer that monitors and detects suspicious activities. “Our ...

Overlooking platform security weakens long-term cybersecurity posture

Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. The report, based on a global study of 800+ IT and security ...

Apache Struts Arbitrary File Upload Vulnerability S2-067 (CVE-2024-53677)

Overview Recently, NSFOCUS CERT monitored that Apache released a security bulletin, fixing the Apache Struts arbitrary file upload vulnerability S2-067 (CVE-2024-53677). Due to a logical defect in the file upload function, an unauthenticated ...

Navigating HIPAA Compliance When Using Tracking Technologies on Websites

Websites have become indispensable tools for healthcare organizations to connect with patients, streamline operations, and enhance service delivery. Modern websites are composed of components that “build” unique user experiences in real ...

Empower Your SOC Teams with Cloud-Native Security Solutions

Can Cloud-Native Security Be a Game-Changer for Your SOC Teams? In today’s complex digital landscape, organizations are increasingly challenged to protect their data while ensuring compliance with evolving cybersecurity regulations. From ...

Proactively Securing Machine Identities to Prevent Attacks

Why Should Proactive Security Management of Machine Identities Be a Priority? With the rise of digitalization across various sectors, organizations have ramped up their security measures to safeguard sensitive data. An area that often gets ...

Empower Your Security with Cloud Compliance Innovations

How Can We Empower Security with Cloud Compliance Innovations? As we continue to leverage cloud services for our businesses, one cannot ignore the escalating complexity of cybersecurity. Non-Human Identities (NHIs) and Secrets Security Management ...

Build Your Confidence in Secrets Sprawl Management

Can You Truly Be Confident in Your Approach to Secrets Management? Cybersecurity is a crucial element in today’s digital landscape, but how can organizations ensure they’re confidently managing their non-human identities and secrets? This is ...

DEF CON 32 – Fireside Chat – The Dark Tangent and National Cyber Director Harry Coker, Jr

Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. ...

Week in review: Microsoft fixes exploited 0-day, top cybersecurity books for your holiday gift list

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes exploited zero-day (CVE-2024-49138) On December 2024 Patch Tuesday, Microsoft resolved 71 vulnerabilities in a variety of its ...

Innovating with Secure Secrets Rotation Techniques

How Are We Innovating with Secure Secrets Rotation Techniques? With the rapid expansion of digitized environments, the demand for effective and secure identity management has surged. Organizations are increasingly relying on machine identities or ...

Proactive Approaches to Identity and Access Management

Why is Proactive Security Crucial in IAM? Have you ever weighed the impact of security breaches and data leaks on your business? Increasingly, organizations are finding tremendous value in adopting a proactive security approach, particularly in ...

Navigating Cloud Security for Future Proofing Your Assets

Why is Cloud Security Imperative for Asset Protection? As businesses increasingly migrate their operations to the cloud, the demand for effective cloud security strategies gains precedence. The criticality of this requirement becomes glaringly ...

Gaining Confidence Through Effective Secrets Vaulting

Why is Secrets Vaulting Crucial in Today’s Cybersecurity Landscape? In a world increasingly dependent on cloud-based services, how do organizations ensure maximum security while maintaining operational efficiency? The answer might just lie in ...

Platforms are the Problem

A better path forward for cybersecurity Why is it that cybersecurity is struggling to keep pace with the rapidly evolving threat landscape? We spend more and more, tighten our perimeters, and still there are trillions of dollars being lost to ...

DEF CON 32 – MobileMesh RF Network Exploitation Getting the Tea from goTenna

Authors/Presenters: Erwin Karincic, Woody Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

2024 Year in Review: Features and Improvements in Pure Signal™ Scout

Team Cymru is excited to share our accomplishments in delivering new features and improvements in Pure Signal™ Scout. Thank you to our... The post 2024 Year in Review: Features and Improvements in Pure Signal™ Scout appeared first on Security ...

Feeling Reassured with Top-Tier API Security Measures

Are You Maximizing Your API Security Measures? If you’re a CISO or a cybersecurity professional, you understand the importance of robust API security measures. But, do these measures ensure optimum protection when non-human identities (NHIs) ...