Application Security News and Articles


Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #315 – Stickies

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! The post Comic Agilé – Mikkel Noe-Nygaard, Luxshan ...

Anton’s Security Blog Quarterly Q4 2024

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Meta AI creation, steampunk ...

GitGuardian Extends Reach to Manage Non-Human Identities

GitGuardian today extended the reach of its ability to manage applications secrets into the realm of non-human identities (NHI) associated with machines and software components. The post GitGuardian Extends Reach to Manage Non-Human Identities ...

Microsoft Challenge Will Test LLM Defenses Against Prompt Injections

Microsoft is calling out to researchers to participate in a competition that is aimed at testing the latest protections in LLMs against prompt injection attacks, which OWASP is calling the top security risk facing the AI models as the industry ...

Critical OpenWrt Bug: Update Your Gear!

ASU 48-bit trash hash: Open source router firmware project fixes dusty old code. The post Critical OpenWrt Bug: Update Your Gear! appeared first on Security Boulevard.

SPA is for Single-Page Abuse! – Using Single-Page Application Tokens to Enumerate Azure

Author: Lance B. Cain Overview Microsoft Azure is a leading cloud provider offering technology solutions to companies, governments, and other organizations around the globe. As such, many entitles have begun adopting Azure for their technology ...

DEF CON 32 – Fireside Chat – The Dark Tangent and DNSA

Authors/Presenters: Anne Neuberger Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Never Underestimate CSRF: Why Origin Reflection is a Bad Idea

CORS misconfigurations are often overlooked, but they can have severe consequences. We demonstrate how reflecting the origin header leads to code execution in Whistle. The post Never Underestimate CSRF: Why Origin Reflection is a Bad Idea ...

How to Secure Non-Human Identities for AI Workloads

4 min readAI workloads operate at machine speed – but their identities risk being exploited, turning innovation into vulnerability. The post How to Secure Non-Human Identities for AI Workloads appeared first on Aembit. The post How to Secure ...

Stamus Networks Clear NDR uncovers unauthorized activity

Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious threats and unauthorized activity before they cause harm to the organization. It can be deployed as a standalone NDR ...

Traveling for the Holidays? Your Digital Identity Is Along for the Ride

Traveling for the Holidays? Your Digital Identity Is Along for the Ride andrew.gertz@t… Tue, 12/10/2024 - 14:20 Identity & Access Management Access Control Thales | Cloud Protection & Licensing Solutions More ...

Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture

Horizon3.ai launched NodeZero Insights, a platform designed for security leaders, CIOs, CISOs and practitioners. This new solution delivers real-time dashboards to measure, track and strengthen an organization’s security posture over time. ...

Decoding SMS Pumping Fraud: Protecting Your Communications

In the digital-first world, SMS messaging remains a common security mechanism for second factor and other verification communication. Whether verifying accounts through one-time passwords (OTPs), notifying customers about transactions, or sharing ...

AppLite: A New AntiDot Variant Targeting Mobile Employee Devices

Our zLabs team has identified an extremely sophisticated mishing (mobile-targeted phishing) campaign that delivers malware to the user’s Android mobile device enabling a broad set of malicious actions including credential theft of banking, ...

Versa Endpoint DLP prevents data exfiltration

Versa announced Versa Endpoint DLP, an integrated endpoint data loss prevention (DLP) capability delivered by the Versa SASE Client as part of the VersaONE Universal SASE Platform. The endpoint DLP feature provides the widest range of data ...

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)

Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain access to organizations’ systems, Huntress researchers warned on Monday. “We’ve ...

Five Ways Spear Phishing Tactics are Evolving in 2025

What type of phishing became very effective around 2010 and still worries security teams today? Spear phishing. Spear phishing remains  highly effective and is getting more dangerous by the day. What is spear phishing? What new technologies and ...

21 years since its inception, GNU Shepherd 1.0.0 is released

GNU Shepherd is a service manager designed to oversee the system’s daemons. It functions both as an “init” system (PID 1) and as a tool for unprivileged users to manage per-user daemons. GNU Shepherd GNU Shepherd supports ...

Given Today’s Data Complexity, a Platform Mindset is Crucial for Cyber Recovery

For too long, architecting for cyber recovery and resiliency was on the vision board for a distant future. Unfortunately, that “distant future” is here, but many companies have not started this critical effort. The post Given Today’s Data ...

Defending Against AI-Powered Attacks in a “Spy vs. Spy” World

Although AI can enhance threat detection and response capabilities, it also introduces sophisticated attack vectors that require a rethink of traditional security models. The post Defending Against AI-Powered Attacks in a “Spy vs. Spy” World ...