Application Security News and Articles


Securing the Software Supply Chain: Checkmarx One Expands its Offerings

The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to ...

Shift Left and Shift Up Workload Attack Surface Protection

In today’s security landscape, the concept of a hardened perimeter is increasingly insufficient. With the rise of hybrid and multi-cloud environments, lateral movement attacks, where attackers move through internal systems once a breach has ...

Empower Your Security with Advanced IAM Features

Why Embrace Advanced IAM Features? The world is witnessing a major shift to cloud-based operations, leading to a surge in non-human identities (NHIs) such as bots, service accounts, and APIs. These non-human entities can pose significant threats ...

Randall Munroe’s XKCD ‘Kedging Cannon’

via the comic humor & dry wit of Randall Munroe, creator of XKCD The post Randall Munroe’s XKCD ‘Kedging Cannon’ appeared first on Security Boulevard.

Azure Key Vault Tradecraft with BARK

Brief This post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of how a red team operator may use these commands ...

Microsoft Veeps Ignite Fire Under CrowdStrike

BSODs begone! Redmond business leaders line up to say what’s new in Windows security. The post Microsoft Veeps Ignite Fire Under CrowdStrike appeared first on Security Boulevard.

Fairwinds Insights Release Notes 16.1.11 – 16.2.4: CVE Mapping Updates

Over the last few months, we’ve been working on making a number of meaningful updates to Fairwinds Insights. We’ve delivered some great new functionality that our Insights customers will definitely benefit from. One of the biggest ...

CISOs Look to Establish Additional Leadership Roles

According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among the top positions being considered to ...

Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses

Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security best practices and ...

Black Friday Scammers are Hard at Work: Security Experts

Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity ...

GitHub Secure Open Source Fund: Project maintainers, apply now!

GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to get funding and knowledge to improve the security and sustainability of their software. The program is funded by companies (AmEx ...

Oracle Linux 9 Update 5 brings security updates, OpenJDK 17, .NET 9.0

Oracle Linux offers a secure, streamlined platform for deploying and managing applications across on-premises, cloud, and edge environments. Designed for demanding workloads, it includes tools for automation, virtualization, high availability, ...

Quantum DXi9200 helps organizations manage and reduce cybersecurity risks

Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient backup and recovery services for large organizations. With the continuing ...

Strengthening Supply Chains: ReversingLabs Now Integrates with ServiceNow

In today’s rapidly evolving digital landscape, ensuring the security of your software supply chain is more critical than ever. At ReversingLabs, we are excited to announce our latest integration with ServiceNow, designed to provide ...

Prioritize Like Your Organization Depended On It 

Introduction  Identifying vulnerabilities is just the first step in exposure management. The real challenge lies in determining which ones matter most and addressing them without wasting resources or disrupting operations. With cyber threats ...

Apple fixes 2 zero-days exploited to breach macOS systems (CVE-2024-44309, CVE-2024-44308)

Apple has released emergency security updates for macOS Sequoia that fix two zero-day vulnerabilities (CVE-2024-44309, CVE-2024-44308) that “may have been actively exploited on Intel-based Mac systems”. About CVE-2024-44309 and ...

Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025

This blog shares Zimperium's 2025 mobile security trends and threat predictions. The post Zimperium Predicts Data Privacy Emphasis, More Evasive Phishing Attacks and Rise of Sideloading in 2025 appeared first on Zimperium. The post Zimperium ...

ArmorCode unifies application security with infrastructure vulnerability management

ArmorCode announced the growth of its ASPM Platform with the ability to unify AppSec and infrastructure vulnerability management. The continued innovation of Risk-Based Vulnerability Management (RBVM) in ArmorCode empowers security teams to ...

Tanium Cloud Workloads provides visibility and protection for containerized environments

Tanium announced Tanium Cloud Workloads, providing real-time visibility and protection for containerized environments. Through image vulnerability scanning, container run-time inventory, rogue container identification, and Kubernetes policy ...

OpenText Cloud Editions 24.4 blends AI with secure data connectivity

OpenText unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work. This release delivers secure, AI-integrated solutions that ...