Application Security News and Articles


Randall Munroe’s XKCD ‘Advent Calendar Advent Calendar’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Advent Calendar Advent Calendar’ appeared first on Security Boulevard.

Splunk SOAR – Sorting Containers to Improve SOAR On-Poll Functionality (Free Custom Function Provided)

Introduction: Splunk SOAR (Security, Orchestration, Automation, and Response) is a very useful tool that can super charge your security operations by giving your security team a relatively easy, low code, automation capability that has great ...

DEF CON 32 – Nano Enigma Uncovering The Secrets In eFuse Memories

Authors/Presenters: Michal Grygarek, Martin Petr Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Law enforcement shuts down Manson Market cybercrime marketplace

Europol has supported the dismantling of a sophisticated criminal network responsible for facilitating large-scale online fraud. In an operation led by the Hanover Police Department (Polizeidirektion Hannover) and the Verden Public Prosecutor’s ...

Why Zero-Day Attacks Bypass Traditional Firewall Security: Defending Against Zero-Day’s like Palo Alto Networks CVE-2024-0012

Recently, Palo Alto Networks identified and patched a critical zero-day vulnerability in their next-generation firewalls (NGFWs). This vulnerability, tracked as CVE-2024-0012, allowed attackers to execute code on vulnerable devices remotely. This ...

Why Retailers Must Secure Their Payment Data This Golden Quarter

There’s a reason why retailers call the final three months of the year the “golden quarter.” As festive shopping ramps up, many will be hoping to generate a large part of their annual revenue in the period between Black Friday and the end ...

AWS Adds Mutiple Tools and Services to Strengthen Cloud Security

Amazon Web Services (AWS) this week made a bevy of updates to improve cloud security, including additional machine learning algorithms for the Amazon GuardDuty service that make it simpler to detect attack patterns. The post AWS Adds Mutiple ...

Mitek Digital Fraud Defender combats AI generated fraud

Mitek announced Digital Fraud Defender (DFD), an advanced, multi-layered solution to safeguard digital identity verification processes against sophisticated AI-enabled fraud tactics. Designed for financial institutions, fintech, online gaming ...

Mitel MiCollab zero-day and PoC exploit unveiled

A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) ...

Bitdefender GravityZone XDR enhancements protect business data stored in the cloud

Bitdefender announced enhancements to its GravityZone XDR platform with the addition of its new Business Applications sensor, designed to protect corporate data hosted and stored in cloud-based productivity and collaboration applications. The ...

RACE Conditions in Modern Web Applications

The concept of a RACE condition and its potential for application vulnerabilities is nothing new. First mentioned back in the […] The post RACE Conditions in Modern Web Applications appeared first on Security Boulevard.

Protecting SLED Organizations: How Schools Can Secure Data Against Modern Threats

The post Protecting SLED Organizations: How Schools Can Secure Data Against Modern Threats appeared first on Votiro. The post Protecting SLED Organizations: How Schools Can Secure Data Against Modern Threats appeared first on Security Boulevard.

Metadata of Americans Stolen in Chinese Hack: U.S. Official

The call metadate of a "large number" of Americans was stolen by Chinese state-sponsored Salt Typhoon's hack of eight U.S. telecoms and dozens more around the world, according to U.S. officials, who are scrambling to map out the scope of the ...

Netography introduces AI-powered ransomware detection capabilities

Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion ...

Middesk Address Risk Insights strengthens onboarding processes

Middesk introduced Address Risk Insights, a critical new addition to its core Know Your Business (KYB) product Verify and its recently introduced risk scoring Signal product. A first for the KYB space, Address Risk Insights helps companies assess ...

Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security

A disturbing new cybersecurity incident has raised alarms across U.S. telecoms, with revelations this week about a large-scale Chinese hacking campaign known as Salt Typhoon. The sophisticated breach targeted at least eight major U.S. telecom ...

Why HNWIs are Seeking Personal Cybersecurity Consultants

From phishing schemes and ransomware attacks to social engineering and doxxing, high-net-worth individuals (HNWIs) face an ever-evolving array of cyber threats, and the risks of digital exposure are greater than ever. Wealth, influence, and ...

What is PHI? (Protected Health Information)

Protected Health Information (PHI) is a critical aspect of healthcare, encompassing any data that can identify an individual and is used in the context of medical care. Examples of PHI include personal identifiers (name, address, Social Security ...

8 US telcos compromised, FBI advises Americans to use encrypted communications

FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the ...

SurePath AI Discover classifies AI use by intent and detects sensitive data violations

SurePath AI launched SurePath AI Discover, a new offering that provides visibility into a company’s employee use of public AI services. By classifying AI use by intent and identifying sensitive data violations, companies can better ...