Application Security News and Articles


LOKKER’s consent management solution blocks all unauthorized data collection on websites

LOKKER released a new consent management solution available in its Privacy Edge Platform. This builds on LOKKER’s earlier release of its Consent Verification tool, which allows businesses to check whether their existing consent management ...

Tufin improves security automation on Azure, GCP, and VMware clouds

Tufin Orchestration Suite (TOS) R24-2 ensures organizations’ network operations are efficient, secure, and always audit-ready by automating complex tasks, enhancing security visibility, and driving compliance. The key benefits TOS R24-2 ...

USENIX Security ’23 – Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis

Authors/Presenters:Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics

Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and brand impersonation - common techniques used by threat actors to proliferate phishing campaigns. ...

Adaptiva enables users to instantly control patch rollouts

Adaptiva launched Flex Controls in OneSite Patch, which give users advanced management capabilities over their patch deployment processes, including the ability to immediately pause or cancel patch rollouts as well as rollback patches to previous ...

Small Business, Big Threats: INE Security Launches Initiative to Train SMBs to Close a Critical Skills Gap

Cary, North Carolina, 10th September 2024, CyberNewsWire The post Small Business, Big Threats: INE Security Launches Initiative to Train SMBs to Close a Critical Skills Gap appeared first on Security Boulevard.

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Key insights and defense strategies were shared at Blue Team Con 2024 in Chicago, where defenders gathered to advance their skills for fighting today’s toughest threats. The post Blue Team Con 2024: Sharing Security Insights and Defense ...

Netskope accelerates cloud networking and security operations

Netskope announced several new innovations in the Netskope One platform, including expanded digital experience management (DEM) features and benefits. Combining key network and security capabilities, Netskope One continues to revolutionize the ...

RansomHub Ransomware Targets Critical Infrastructure: A Detailed Look at the CISA-FBI Advisory

A recent joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) has highlighted a significant threat to critical infrastructure sectors across the United States: RansomHub ...

Ketch helps media brands enable privacy-safe data activation

Ketch launched its product suite for digital media brands. The digital media industry faces increasing challenges. Intense FTC scrutiny on targeted advertising, growing pressure to deliver precise, permissioned targeting, and the existential ...

No Ransom Demand by Rhysida Before Columbus Data Leak: City IT Chief

The Rhysida ransomware group may have been behind the July attack on on the city of Columbus, Ohio, but there was never a ransom demand and the hackers ignored attempts by city officials to contact them, according to the head of the city's IT ...

Stay Ahead of Cyber Threats with Autonomous Penetration Testing

Explore how autonomous penetration testing with NodeZero helps organizations meet NIS 2 compliance by enhancing cybersecurity through scalable, efficient risk assessments. The post Stay Ahead of Cyber Threats with Autonomous Penetration Testing ...

CAST AI Automates Kubernetes Security Posture Management to Block Runtime Threats

CAST AI boasts that its Kubernetes automation platform cuts AWS, Azure and Google Cloud Platform costs by more than 50%. The post CAST AI Automates Kubernetes Security Posture Management to Block Runtime Threats appeared first on Security Boulevard.

API Security Drives Business Growth for Hibbett

Preserving Rich History with API Security The mark of many successful businesses is longevity, and Hibbett certainly fits that description. They have been around longer than many, if not most, retailers in the U.S. Headquartered in Birmingham, ...

Galileo delivers real-time fraud detection for fintechs, banks and businesses

Galileo is delivering fintechs, banks and businesses new ways to fight fraud with the launch of Galileo Instant Verification Engine (GIVE) and Transaction Risk GScore. As digital transactions surge and cyber threats evolve, these tools offer ...

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting SonicWall’s firewalls – to its Known Exploited Vulnerabilities catalog, ...

Fake recruiter coding tests target devs with malicious Python packages

ReversingLabs researchers have identified new, malicious software packages believe to be linked to a campaign, VMConnect, that our team first identified in August 2023 and which has ties to the North Korean hacking team Lazarus Group. The new ...

Looking Toward U.S. Federal Privacy Regulation, How Software Companies can Prepare

Software developers, as key players in the digital ecosystem, must proactively adapt to these changes to ensure compliance and uphold the privacy rights of users. The post Looking Toward U.S. Federal Privacy Regulation, How Software Companies can ...

Risk Assessment and Gap Analysis for Industrial Control System infrastructure: the core essentials  

Conducting a risk assessment and gap analysis exercise for Industrial Control System environments is important from cybersecurity, business continuity, and risk mitigation perspectives. It is important to bring the risk exposure down to ...

Why ‘Shift-Left’ Isn’t Good Enough? Our conversation with Chris Romeo

This blog is based on our conversation with Chris Romeo, founder of Devici, an AI-infused collaborative threat modeling tool. It explores how "shift-left" may be a useful tool in the security toolkit, but it’s far from the only one. The post ...