Application Security News and Articles


What’s a Zero-Day Vulnerability? Prevent Exploits and Attacks

Zero-day vulnerabilities are serious threats. They’re completely unknown to both the vendor and the user. That gives attackers a significant advantage, allowing them to attack systems before patches are available. The post What’s a Zero-Day ...

Critical Steps to Keep Your Cloud Data Protected

Why Should Cloud Data Protection Be Your Top Priority? With the steep rise in digitalization, sensitive data has moved from the physical world into the boundless digital realm. Cloud computing has become a crucial part of this transition, thus ...

7 Must-Have Salesforce Security Practices

Explore the Salesforce security practices that are essential to your business and understand how AppOmni can empower Salesforce customers across industries. The post 7 Must-Have Salesforce Security Practices appeared first on AppOmni. The post 7 ...

Holding Back Salt Typhoon + Other Chinese APT CVEs

Over the past several years, US Federal Agencies and private sector companies have observed China-based threat actors targeting network and telecommunication critical infrastructure. A wave of recent reports have disclosed that these attacks have ...

DEF CON 32 – Using ALPC Security Features To Compromise RPC Services

Authors/Presenters: WanJunJie Zhang, Yisheng He Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Charges Against CISOs Create Worries, Hope in Security Industry: Survey

A survey of IT security pros by cybersecurity firm BlackFog found that 70% of them said federal cases like that against SolarWinds' CISO hurt their opinion about the position, but some said they expected the boards of directors would take the ...

A SaaS Identity Christmas Carol | Grip Security

Discover a festive twist on SaaS identity risk with our Christmas classic inspired tale. Learn lessons from the ghosts of SaaS past, present, and future. The post A SaaS Identity Christmas Carol | Grip Security appeared first on Security Boulevard.

Mass Breaches in the Age of AI

Targeted Scams & What to do About Them Chris Clements, VP of Solutions Architecture Companies that have suffered massive data breaches are quick to downplay the risks, but they’re ignoring the elephant in the room: the sheer volume of ...

AI Slop is Hurting Security — LLMs are Dumb and People are Dim

Artificial stupidity: Large language models are terrible if you need reasoning or actual understanding. The post AI Slop is Hurting Security — LLMs are Dumb and People are Dim appeared first on Security Boulevard.

2024 Recap: 8 Notable and Dangerous Chrome Vulnerabilities

With a market share of 66.68%, Google Chrome remains a prime target for cyberattacks. In 2024, this widely used browser faced numerous critical Chrome vulnerabilities that put businesses and individuals at risk and led to significant damage. ...

CISA and FCC Issue Urgent Call for Cyber Hardening for Communications Infrastructure

CISA has released new cybersecurity guidelines for communications infrastructure. The guidance comes in the wake of a series of disclosures that massive Telecommunications Carriers have been compromised by Salt Typhoon and other China-sponsored ...

MOVEit Repackaged and Recycled

The largest repackage and re-post of an old leak In November 2024, a hacker known as “Nam3L3ss” allegedly released previously undisclosed data from the MOVEit breach in May 2023. This leak consisted of millions of records, including sensitive ...

Cleo patches zero-day exploited by ransomware gang

Cleo has released a security patch to address the critical vulnerability that started getting exploited while still a zero-day to breach internet-facing Cleo Harmony, VLTrader, and LexiCom instances. Version 5.8.0.24 of the three products, which ...

Why Your Code Shouldn’t Be Like a Party with the Door Wide Open: DevSecOps 101

If your code isn’t secure, you’re basically hosting a party with the door wide open.Continue reading on Medium »

What’s New in CodeSonar 8.3

CodeSonar 8.3 is a significant upgrade, containing new features and integrations, improved compiler and language support, and more checkers. The highlights are listed below; for more complete details, please consult the Release Notes. We ...

A Year in Data Security: Five Things We’ve Learned From 2024

As the dust settles on another hectic 12 months, business and IT leaders should enjoy a well-earned break. But not for long. The end of one year offers a fantastic vantage point from which to view the macro trends that may go on to shape the ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating the Financially Motivated ...

Shielded on All Sides: How Company Executives Can Mitigate Virtual Kidnapping Schemes

Nisos Shielded on All Sides: How Company Executives Can Mitigate Virtual Kidnapping Schemes Virtual kidnapping, or virtual kidnapping for ransom, is a coercive telephonic scheme used to extort ransom payments from victims... The post Shielded on ...

How Much Will Cybercrime Cost Your E-Commerce Business This Season?

The 2024 holiday season has seen explosive growth in e-commerce, with transaction volumes more than doubling from 5.1 billion in 2023 to 10.4 billion this year. While this highlights the strength of online shopping, it also points to a parallel ...

Enhancing Healthcare with Cloud Tech Without Compromising Security

The post Enhancing Healthcare with Cloud Tech Without Compromising Security appeared first on Votiro. The post Enhancing Healthcare with Cloud Tech Without Compromising Security appeared first on Security Boulevard.