Application Security News and Articles


The SBOM has a long history — but what’s next is what matters

Software bills of materials (SBOMs) are having their day — they're even government-mandated at times. In September 2023, the U.S. Food and Drug Administration issued its final version of “Cybersecurity in Medical Devices: Quality System ...

Losses due to cryptocurrency and BEC scams are soaring

Every type of fraud is on the rise, and 2023 was a particularly devastating year for victims of cryptocurrency and business email compromise (BEC) scams, according to the FBI. Cryptocurrency fraud Based on complaints filed to FBI’s Internet ...

BYOD Policies Fueling Security Risks

The use of employee mobile devices at work, or bring your own device (BYOD), is a significant and growing threat to organizational security. The post BYOD Policies Fueling Security Risks appeared first on Security Boulevard.

Ubuntu 24.04.1 LTS Released: This is What’s New

Canonical’s Ubuntu 24.04 LTS, codenamed “Noble Numbat” has received its first major update: Ubuntu 24.04.1. This release, which arrived a bit later than initially planned due to some high-impact bugs, brings a host of improvements and ...

Cloudera Private Link Network helps enterprises protect their data

Cloudera launched Cloudera Private Link Network to address critical data security and privacy concerns for highly regulated organizations with strict internal data security policies. Cloudera Private Link Network provides secure, private ...

CEL and Kubescape: transforming Kubernetes admission control

Guest post originally published on Kubescape’s blog by Oshrat Nir, Developer Advocate at ARMO and a Kubescape contributer. Introduction Admission control is a crucial part of The post CEL and Kubescape: transforming Kubernetes admission ...

VirtualBox 7.1: This is a major update, here’s what’s new

VirtualBox is a full virtualizer for x86 hardware designed for servers, desktops, and embedded systems. VirtualBox 7.1 introduces an enhanced user interface, cloud VM management, ARM support, Wayland compatibility, and more. New features in ...

US Elections: Iranian Hackers Target Political Campaigns

With elections, there have always been accusations of rigging and corruption and it’s possible that such claims may hold some truth in different countries worldwide. However, the US elections have recently been subjected to the influence of ...

The Importance of IAM in Critical Infrastructure

The Importance of IAM in Critical Infrastructure madhav Thu, 09/12/2024 - 06:23 Over the past year, the world's critical infrastructure (CI) - including energy, healthcare, finance, communications, manufacturing, and transport - has suffered a ...

News alert: Criminal IP partners with IPLocation.io to deliver new tech to mitigate IP address evasion

Torrance, Calif., Sept. 11, 2024, CyberNewsWire — Criminal IP, a distinguished leader in Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, announced that it has successfully integrated its IP address-related risk detection ...

News alert: Opus Security’s new ‘Advanced Multi-Layered Prioritization Engine’ elevates VM

Palo Alto, Calif., Sept.11, 2024, CyberNewsWire — Opus Security, the leader in unified cloud-native remediation, today announced the launch of its Advanced Multi-Layered Prioritization Engine, designed to revolutionize how organizations manage, ...

Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense

In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including ...

Benefits and best practices of leveraging AI for cybersecurity

AI has become a key player in protecting valuable organizational insights from threats. Thanks to AI-enabled data protection practices such as behavior monitoring, enterprises no longer have to be reactive to a cyberattack but can be proactive ...

Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences

Torrance, United States / California, 12th September 2024, CyberNewsWire The post Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences appeared first on Security Boulevard.

Internal disconnects vs. cybersecurity: How connectivity shapes challenges

Concerns about the trustworthiness of internal data exist in nearly all organizations globally, according to TeamViewer. 99% of business leaders pointed to factors undermining trust in internal data, citing multiple versions of the truth (38%), ...

NSFOCUS Recognized in Eight Security Innovations in the Gartner® Hype Cycle™ for Security in China, 2024 Report

Gartner® has recently unveiled its Hype Cycle for Security in China, 2024 and NSFOCUS has been recognized as a Sample Vendor across eight security innovations. We believe this is a testament to NSFOCUS’s commitment to innovation and its role ...

Imperva Protects Against Critical Apache OFBiz Vulnerability (CVE-2024-45195)

Recently, a critical vulnerability in the widely used Apache OFBiz framework was disclosed, designated CVE-2024-45195. This vulnerability allows for unauthenticated remote code execution (RCE), making it an especially dangerous flaw for ...

5 Stages of Shadow IT Grief | Grip

Shadow IT grief: where seemingly minor SaaS oversights can turn into major risks, leaving your company exposed. Don’t let shadow IT derail your SaaS security. The post 5 Stages of Shadow IT Grief | Grip appeared first on Security Boulevard.

800% Growth: LLM Attacker Summaries a Hit with Customers

We are excited to share the tremendous response to our Large Language Model (LLM) attacker summary feature. Since its launch, usage has increased by an amazing 800%, demonstrating its significant impact on our customers' daily operations. An ...

Vulnerability handling requirements for NIS2 compliance

In a previous blog post, we covered two foundational elements of the Network and Information Security (NIS2) Directive, software supply chain security and reporting requirements. In this blog, we take a closer look at the types of organizations ...