Application Security News and Articles


Just-in-Time Access: Key Benefits for Cloud Platforms

Just-in-time access has emerged as a game-changing approach to enhance the security posture of cloud environments. This innovative method aligns with the principle of least privilege, reducing the attack surface and minimizing potential security ...

Phishing Threats Surround Trump Digital Trading Cards: How Attackers Are Exploiting the Trend 

As the popularity of collectible cards continues to rise—whether it’s Pokémon, NBA, NFL, or Star Wars—cyber attackers have found a new target: digital trading cards. Recently, Donald Trump announced his own digital trading card series, ...

AI-Powered Deepfake Scams Wreak Havoc on Businesses

More than half (53%) of businesses in the U.S. and UK have been targeted by financial scams using deepfake technology, with 43% of those companies falling victim, according to a Medius survey of 1,533 finance professionals. The post AI-Powered ...

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)

Users of Zyxel network-attached storage (NAS) devices are urged to implement hotfixes addressing a critical and easily exploited command injection vulnerability (CVE-2024-6342). About CVE-2024-6342 Zyxel NAS devices are generally used by small to ...

Sedexp Malware: The Stealthy Linux Threat Evading Detection

A new, sophisticated Linux malware named “sedexp” has been discovered, quietly evading detection since 2022. Its unique persistence technique, leveraging udev rules, has allowed it to operate under the radar, making it a particularly ...

Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key Infrastructure and eID Solution

Singapore, SG, 10th September 2024, CyberNewsWire The post Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key Infrastructure and eID Solution appeared first on Security Boulevard.

TuxCare and Ntegral Partner to Offer Extended Lifecycle Support for Critical Systems

PALO ALTO, Calif. – September 10, 2024 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it inked a partnership with Atlanta, Georgia-based Ntegral, a leading IT solutions provider and consultancy, to ...

Alert: Hackers Use Bogus npm Packages To Target Developers

North Korean threat actors have recently been observed publishing malicious packages to the npm registry. Reports claim that these acts now indicate unified efforts pertaining to developers being targeted with malware and the theft of ...

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs

Huntress announces the arrival of its new Managed SIEM solution, designed to serve small—to mid-sized enterprises and their MSP allies with everything a Security Information and Event Management (SIEM) should provide and none of what makes ...

Free SaaS Pulse tool from Wing Security enhances SaaS security posture

Wing Security has released SaaS Pulse, a free tool for SaaS security management, offering organizations actionable insights and continuous oversight into their SaaS security posture. This free tool continuously monitors threats from issues like ...

Astrix Security collaborates with GuidePoint Security to secure non-human identities

Astrix Security and GuidePoint Security announced a strategic partnership to help their customers secure and manage Non-Human Identities across their corporate and production environments.  With 20,000 Non-Human Identities (NHI) for every 1,000 ...

Legal Impact of GDPR Data Policy Violations

GDPR violations can result in severe consequences. In its first year, over 89,000 data breaches were reported, leading to fines totaling €56 million. In 2019, the UK’s Information Commissioner’s Office (ICO) imposed record fines on British ...

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day operations. Zero-days are also an old phenomenon. In the past, due to a ...

How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how human-led approaches complement each other to form ...

33 open-source cybersecurity solutions you didn’t know you needed

Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make cybersecurity accessible to a broader range of organizations and ...

6 Tips to Simplify Security Automation Adoption

The post 6 Tips to Simplify Security Automation Adoption appeared first on AI-enhanced Security Automation. The post 6 Tips to Simplify Security Automation Adoption appeared first on Security Boulevard.

Eclypsium Product Roadmap

Join Eclypsium Product Manager, Joe Hopp, for an overview of new product updates and a preview of the features and solutions on the Eclypsium Supply Chain Security Platform roadmap. The post Eclypsium Product Roadmap appeared first on Eclypsium ...

Why Investing in Quality Analysts is Investing in Your Future

In a rapidly evolving marketplace, the quality of your products and services directly impacts your company’s longevity and success. By investing in the services of...Read More The post Why Investing in Quality Analysts is Investing in Your ...

Mitigating Unforeseen SaaS Risks in M&A Integrations | Grip

Learn how to proactively manage SaaS risks in M&A integrations, uncover hidden vulnerabilities, and secure your newly merged organization for long-term success. The post Mitigating Unforeseen SaaS Risks in M&A Integrations | Grip appeared ...

USENIX Security ’23 – BunnyHop: Exploiting the Instruction Prefetcher

Authors/Presenters:Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...