Application Security News and Articles


DEF CON 32 – Clash, Burn And Exploit Manipulate Filters To Pwn kernelCTF

Authors/Presenters: HexRabbit Chen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

From Europe to South Africa: Where Is the World on Cyber Defense?

As we wrap up 2024, two new reports suggest that Europe and leading African nations share many of the same cyber threats and potential cybersecurity solutions as their U.S. counterparts. The post From Europe to South Africa: Where Is the World on ...

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service ...

Best Practices for Machine Identity Management

Why is Machine Identity Management Crucial? In the ever-evolving field of cybersecurity, one critical element often overlooked is machine identity management. Even though humans interact with machines daily, the importance of securing machine ...

Mastering PAM to Guard Against Insider Threats

Why is Privileged Access Management (PAM) a Game-Changer in Cybersecurity? Have you ever wondered how to shore up your organization’s cybersecurity, minimize insider threats, and increase efficiency? The answer lies in mastering the art of ...

Enhancing Data Security with Advanced Secrets Rotation

How can Secrets Rotation Enhance Data Security? Most of us are well aware of the essential role that cybersecurity plays in safeguarding our sensitive information. But have you ever pondered about the importance of Non-Human Identity (NHI) ...

Best Practices for Machine Identity Management

Why is Machine Identity Management Essential in Today’s Cybersecurity Landscape? Machine Identity Management has become a crucial element in today’s cybersecurity landscape. As organizations increasingly rely on cloud environments, the need ...

Qualys DAST: Key Features and Alternatives

Explore the key features of Qualys DAST, its web application security capabilities, potential limitations, and alternative DAST solutions. The post Qualys DAST: Key Features and Alternatives appeared first on Security Boulevard.

Lest We Forget: United States National Pearl Harbor Remembrance Day, In Memoriam: The 2,403

On August 23, 1994, the United States Congress, by Public Law 103–308, 108 Statute 1169, designated December 7th of each year as National Pearl Harbor Remembrance Day. On November 29th, President Bill Clinton issued a proclamation declaring ...

gosec: A Simple Way to Secure Your Go Projects

In this blog, we’ll explore gosec, a static analysis tool for securing your Go projects. We’ll cover its installation, the rules it…Continue reading on Medium »

gosec: A Simple Way to Secure Your Go Projects

In this blog, we’ll explore gosec, a static analysis tool for securing your Go projects. We’ll cover its installation, the rules it…Continue reading on Medium »

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device

Fifteen years ago I blogged about a different SQUID. Here’s an update: Fleeing drivers are a common problem for law enforcement. They just won’t stop unless persuaded­—persuaded by bullets, barriers, spikes, or snares. Each option is ...

How Secure Vaulting Keeps Your Secrets Safe

Why is Secrets Vaulting Essential for Data Security? As organizations increasingly adopt cloud technology and automation across various industries, securing Non-Human Identities (NHIs) and their secrets has emerged as a crucial element in the ...

Exploring the Future of Cloud-Native Security Solutions

Are We Fully Aware of the Cybersecurity Threats We Face in the Cloud? In today’s interconnected world, maintaining a secure environment is paramount. The advent of the cloud has expanded the horizon of potential threats, as it has given rise to ...

Emerging Ransomware Group Termite Claims Attack on Blue Yonder

Termite, an emerging ransomware group that launched its data leak site in late October and appears to be using a modified version of the Babuk malware, is claiming responsibility for the hack of giant SaaS provider Blue Yonder late last month ...

Attention CISOs: The New EU PLD Product Liability Directive Is Effective Now – Compliance and Cybersecurity Readiness Required

The European Union’s updated Product Liability Directive (PLD) takes effect this month, with a transition period through December 9, 2026. This update substantially changes how product liability applies to digital products sold in the EU. For ...

DEF CON 32 – Encrypted Newspaper Ads In The 19th Century

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Daniel Stori’s Turnoff.US: ‘Super Power’

via the inimitable Daniel Stori at Turnoff.US!! Permalink The post Daniel Stori’s Turnoff.US: ‘Super Power’ appeared first on Security Boulevard.

Stoli Vodka: Bankrupt After Ransomware Attack

Absolutely un-fabulous: Smells like Russia is responsible, but reality is a bit more complicated. The post Stoli Vodka: Bankrupt After Ransomware Attack appeared first on Security Boulevard.

5 Cyber Risk Predictions That Will Define 2025

The cyber landscape is evolving rapidly with new opportunities and threats branching off of every new technological breakthrough. From operational resilience to leadership structures, the decisions IT leaders make today Read More The post 5 Cyber ...