Application Security News and Articles


FFIEC Will Sunset the Cybersecurity Assessment Tool: Everything You Need to be Prepared

The Federal Financial Institutions Examination Council (FFIEC) has officially announced that its Cybersecurity Assessment Tool (CAT) will phase out by August 31, 2025. Launched in June 2015, the CAT has helped financial institutions assess and ...

USENIX Security ’23 – Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities

Authors/Presenters:Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, and Lu Xiang, Chunyang Chen Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Customer Story | Protecting Students and Data in Google Workspace at Santa Rita Union School District

Santa Rita USD’s IT Team Partners with ManagedMethods to Improve Google Security and Safety Santa Rita Union School District in Salinas, CA, serves about 3,200 students and employs approximately 350 faculty and staff. As the district embraced ...

New Findings on the National Public Data Breach: Poor Security Measures and the Role of Infostealer Malware as a Possible Vector of Attack 

In recent months, the National Public Data (NPD) breach has been a topic of intense scrutiny, with cybersecurity experts like Brian Krebs highlighting the poor security practices that contributed to the breach’s magnitude. As we continue to ...

Kali Linux 2024.3 released: 11 new tools, Qualcomm Snapdragon SDM845 SoC support

Kali Linux 2024.3 is now available for download. Besides the new tools, this release mainly focuses on behind-the-scenes updates and optimization. New tools in Kali Linux 2024.3 This Kali release is about new tools and package updates: goshs ...

Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS

Week B: Bugs begone! This month Redmond fixes 79 security flaws in Windows and other products The post Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS appeared first on Security Boulevard.

In Memoriam: 9/11 Victims

Permalink The post In Memoriam: 9/11 Victims appeared first on Security Boulevard.

Understand Blocked Requests Faster with Rule Tracing | Impart Security

Introducing Rule Tracing We're excited to announce the release of Rule Tracing, a powerful new feature in Impart Security that provides clear visibility into which specific security rule triggered a blocking decision. This feature enables ...

Can AI Help Fix Security Vulnerabilities?

We get a lot of questions from our customers around the topic of artificial intelligence in combination with SAST (Static Application Security Testing). Everybody is looking for the next level of efficiency around DevSecOps. With CodeSonar the ...

How to Handle Secrets in Go

Learn the best practices for handling secrets in Go in the cloud-native ecosystem. The post How to Handle Secrets in Go appeared first on Security Boulevard.

A Webinar Recap: The FCC Schools and Libraries Cybersecurity Pilot Program

Recently, we hosted a live webinar that discusses everything you need to know about the FCC School and Libraries Cybersecurity Pilot Program. This webinar outlines an overview of the new program, discusses why securing Google Workspace and/or ...

Navigating the Risks of Namespace Collision: A Critical Security Challenge

In today’s digital landscape, organizations face a multitude of cybersecurity threats, one of which is the often-overlooked issue of namespace collision. This vulnerability arises when internal domain names conflict with newly registered ...

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated Active Directory Certificate Services (ADCS) objects into BloodHound and demonstrated how to effectively use BloodHound to identify attack ...

Mitiga Cloud MDR detects threats in SaaS and cloud environments

Mitiga unveiled its Cloud Managed Detection and Response (MDR) service, designed to provide 24/7 protection against the increasingly complex threats targeting cloud and SaaS environments. This comprehensive solution enables organizations to ...

SpecterOps Extends Reach of BloodHound Tool for Mapping Microsoft AD Attacks

SpecterOps has added the ability to track attack paths across instances of Microsoft Azure Directory (AD) running in both on-premises and on the Microsoft Azure cloud service. The post SpecterOps Extends Reach of BloodHound Tool for Mapping ...

The SBOM Survival Guide: Why SBOM Compliance is Set to Ignite IoT Security

Once SBOM and IAM provisioning knit seamlessly with policy-driven data encryption and AI-powered monitoring, they will have a far stronger security posture. The post The SBOM Survival Guide: Why SBOM Compliance is Set to Ignite IoT Security ...

Ivanti fixes critical vulnerabilities in Endpoint Management (CVE-2024-29847)

Ivanti has fixed a slew of vulnerabilities affecting its Endpoint Manager solution, including a maximum severity one (CVE-2024-29847) that may allow unauthenticated attackers to remotely execute code in the context of the vulnerable system, and ...

Evaluating the Effectiveness of Reward Modeling of Generative AI Systems

New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Human Feedback (RLHF): “SEAL: Systematic Error Analysis for Value ALignment.” The paper introduces quantitative metrics for evaluating the ...

Opus Security empowers organizations to prioritize the most critical vulnerabilities

Opus Security launched its Advanced Multi-Layered Prioritization Engine, designed to revolutionize how organizations manage, prioritize and remediate security vulnerabilities. Leveraging AI-driven intelligence, deep contextual data and automated ...

Tenable AI Aware provides exposure insight into AI applications, libraries and plugins

Tenable released AI Aware, advanced detection capabilities designed to surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management. Tenable AI Aware provides exposure insight into AI ...