Application Security News and Articles


The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of ...

Microsoft enforces defenses preventing NTLM relay attacks

Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up ...

Application Security Testing with SAST: A Key to Secure Development

Application security testing is the key to protecting your enterprise applications.Continue reading on Medium »

BadRAM: $10 hack unlocks AMD encrypted memory

Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules to unlock the chips’ encrypted memory. The SPD chip can be modified using an ...

Top 10 Web Design Security Best Practices to Follow in 2025

This blog explores ten essential web design security practices every developer and business should adopt to stay ahead of potential attacks. The post Top 10 Web Design Security Best Practices to Follow in 2025 appeared first on Security Boulevard.

Ho-Ho-Hold the Scams: Safeguarding Your Employees Against Holiday Phishing Scams

As Christmas is around the corner, even the grinchiest among us can’t ignore that holiday vibe. Christmas songs are playing as we do our grocery shopping, families are planning long-awaited get-togethers, and your employees are (hopefully) ...

Cybersecurity Products or Platforms – Which is More Effective?

Understanding the nuances between cybersecurity products and platforms is crucial for enhancing business protections and supporting businesses anywhere. The post Cybersecurity Products or Platforms – Which is More Effective? appeared first ...

Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025

One of the most significant regulatory mandates on the horizon is the European Union’s Digital Operational Resilience Act (DORA). The post Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025 appeared first ...

Picus provides automated pentesting testing to help uncover critical risks

Picus Security announced new innovations to its Attack Path Validation (APV) product. The new Picus APV now offers security teams accurate, risk-free, and continuous automated penetration testing to uncover critical risks, while significantly ...

Cato Networks extends SASE-based protection to IoT/OT environments

With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet of Things (IoT) and operational technology (OT) devices. Cato IoT/OT Security converges device discovery and ...

EASA Part IS

What is EASA? EASA stands for the European Union Aviation Safety Agency. It is a regulatory body established by the European Union to ensure a high and uniform level of safety in civil aviation across Europe. The EASA framework provides a ...

IATA Cyber Regulations

The International Air Transport Association (IATA) Cyber Security Regulations represent a set of guidelines and standards aimed at enhancing cybersecurity resilience within the aviation industry. These regulations are critical for ensuring the ...

Trellix Drive Encryption enhances security against insider attacks

Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection deployment to safeguard their data and devices from unauthorized access. “The ...

CyTwist’s detection engine combats AI-generated malware

CyTwist launches its patented detection engine to combat the insidious rise of AI-generated malware. Enhancing an organization’s existing security stack, CyTwist’s solution profiles threat actors using field-proven counterintelligence ...

SOC 2 Policies: What They Should Include and Why They Matter

Learn how SOC 2 policies safeguard data, ensure compliance, and simplify the audit process for your business. The post SOC 2 Policies: What They Should Include and Why They Matter appeared first on Scytale. The post SOC 2 Policies: What They ...

Open source malware up 200% since 2023

Sonatype’s 2024 Open Source Malware Threat Report reveals that the number of malicious packages has surpassed 778,500 since tracking began in 2019. In 2024, researchers examined how threat actors leverage malicious open-source packages to ...

Why crisis simulations fail and how to fix them

In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the key differences between in-person and virtual cyber crisis simulations and what makes each approach effective. ...

Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and ...

Patch Tuesday Update – December 2024

In this Patch Tuesday edition, Microsoft addressed 72 CVEs, including 1 Zero-Day, 16 Criticals, 54 Important and 1 Moderate—the one Zero-Day was found to be actively exploited in the wild. From an Impact perspective, Escalation of Privilege ...