Application Security News and Articles


Emulating the Persistent and Stealthy Ebury Linux Malware

AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Despite previous arrests and actions against key perpetrators, Ebury continues to evolve, and its ...

Microsoft’s September 2024 Patch Tuesday Addresses 4 Zero-Days, 79 Vulnerabilities

On September 10, 2024, Microsoft released its latest round of security updates as part of its monthly Patch Tuesday program. This month’s updates address a total of 79 vulnerabilities across various Microsoft products, including four zero-day ...

Proofpoint Adds Ability to Dynamically Apply Granular Security Controls

Proofpoint this week at its Protect conference launched a series of efforts through which it plans to provide cybersecurity teams with more granular controls in real-time, over what applications and services are accessed by end users. The post ...

Randall Munroe’s XKCD ‘Water Filtration’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Filtration’ appeared first on Security Boulevard.

Defensive Stack Optimization: A Threat-Informed Defense Use Case

In this blog series, we dive into the challenges faced by our heroes of Threat-Informed Defense, how they address them, and the benefits they are driving for their team and organization.  The post Defensive Stack Optimization: A Threat-Informed ...

A proactive defense: Utilize SBOMs and continuous monitoring

Navigating the complexities of software supply chain security demands proactive measures to identify and manage vulnerabilities and compliance issues effectively. The post A proactive defense: Utilize SBOMs and continuous monitoring appeared ...

4 Best Practices for Using Cloud-Native Infrastructure for AI Workloads

Artificial intelligence (AI) is one of the hottest buzzwords these days, dominating headlines and rocking the stock market. Many companies have already added AI functionality to their software solutions, and many hope to add even more in the ...

Microsoft Is Adding New Cryptography Algorithms

Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article: The first new algorithm Microsoft added to SymCrypt is called ML-KEM. Previously known as ...

Threat Actors Are Finding it Easier Than Ever to Breach Cyber-Defenses: Enter Data-Centric Security

Global end-user spending on information security is projected to hit $212bn next year, an increase of 15% from 2024, according to Gartner. Yet at the same time, data breach costs continue to spiral. The latest IBM report now puts the global ...

USENIX Security ’23 – Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures

Authors/Presenters:Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk Bochum Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

Blocking in Production Requires a Modern Security DevEx | Impart Security

Blocking in Production Requires a Modern Security DevEx I've spoken to many security leaders who are genuinely scared of blocking in production. And I totally get it - blocking is scary. Some folks have real PTSD from past mistakes. One security ...

Suspect arrested over the Transport for London cyberattack

The UK National Crime Agency has arrested and detained a suspect – a 17-year-old male in Walsall (West Midlands) – on suspicion of Computer Misuse Act offences in relation to the Transport for London (TfL) cyberattack, the agency has ...

Aembit’s Vision for Non-Human Identity and Access Management Gains $25 Million in Backing

3 min read How our journey began – and why securing non-human identities is personal for us and our mission. The post Aembit’s Vision for Non-Human Identity and Access Management Gains $25 Million in Backing appeared first on Aembit. The ...

Dru Investigate simplifies cyber investigations and helps users uncover data threats

Druva launched Dru Investigate, a gen AI-powered tool that guides data security investigations using a natural language interface. With Dru Investigate, users across IT, security, legal, and privacy teams can swiftly identify and mitigate data ...

Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management

Silver Spring, United States, 12th September 2024, CyberNewsWire The post Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management appeared first on Security Boulevard.

Two Lies, One Truth in Securing Your SaaS Stack

Mythology surrounding technology is pervasive. Although ideas like Macs can’t get viruses, charging a phone overnight destroys the battery, and private browsing prevents tracking have all been debunked, they continue to inform decisions.  SaaS ...

NETSCOUT enhances Omnis Cyber Intelligence platform with MITRE ATT&CK behavioral analytics

NETSCOUT announced updates to its advanced, scalable deep packet inspection-based Omnis Cyber Intelligence Network Detection and Response (NDR) platform. New MITRE ATT&CK behavioral analytics enable earlier detection of advanced threats like ...

How to Strengthen and Improve Your Company’s Security Posture

Maintaining security posture is key to protecting organizations against cyberattacks. Here’s how to improve your security posture and keep your business safe.  The post How to Strengthen and Improve Your Company’s Security Posture ...

Tines Leverages LLMs to Simplify Security Automation

Tines today added an artificial intelligence (AI) chat interface to its no-code platform for automation cybersecurity workflows. The post Tines Leverages LLMs to Simplify Security Automation appeared first on Security Boulevard.

Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)

Among the security updates released by Adobe on Tuesday are those for various versions of Adobe Acrobat and Reader, which fix two critical flaws that could lead to arbitrary code execution: CVE-2024-45112 and CVE-2024-41869. Nothing in the ...