Application Security News and Articles


Achieving Cyber Clarity: myNuspire for Unified Cybersecurity Management

To stay ahead of cyber threats, organizations need a dynamic and unified approach to managing their security landscape. That’s where Nuspire’s myNuspire platform steps in, serving as a cornerstone of our managed security services. It combines ...

Empowering Cybersecurity on the Go: Nuspire’s Revolutionary Mobile App

In a world where cybersecurity threats don’t keep to office hours, having a mobile app cybersecurity solution that allows you to respond swiftly and effectively is crucial. Imagine you’re at an offsite meeting or traveling between locations ...

How to Mitigate the Risk of GitHub Actions

Get highlights of our research into the security of GitHub Actions, and our advice on mitigating the risk.  The post How to Mitigate the Risk of GitHub Actions appeared first on Security Boulevard.

USENIX Security ’23 – Inception: Exposing New Attack Surfaces with Training in Transient Execution

Authors/Presenters:Daniël Trujillo, Johannes Wikner, Kaveh Razavi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

Veriti was mentioned as a Representative Vendor for the Pure-Play ASCA category in the 2024 Gartner® Innovation Insight: Automated Security Control Assessment 

Veriti a leading force in exposure assessment and remediation, is thrilled to be mentioned in the 2024 Gartner Innovation Insight: Automated Security Control Assessment report. Gartner states in this report that “ASCA helps evaluate and ...

TP-Link Omada Cloud Essentials: Centralized network management and monitoring

TP-Link launched Omada Cloud Essentials, a simplified, free cloud management option designed for surveillance networks, hostels, and large homes. Omada offers a flexible cloud management architecture, including an on-premises Hardware Controller, ...

The Weaponization of AI and ML is Complicating the Digital Battlefield

Zero-trust architecture is increasingly seen as a solution to the challenges posed by AI and ML. Initial training must focus on standardizing basic technologies. The post The Weaponization of AI and ML is Complicating the Digital Battlefield ...

DataDome Earns 2024 Great Place To Work Certification™

DataDome is proud to be Certified™ by Great Place to Work®! 95% of employees praise executive leadership for approachability and more. Get the details. The post DataDome Earns 2024 Great Place To Work Certification™ appeared first on ...

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data. Discovered and reported by Code WHite researcher Florian Hauser, the vulnerability can be ...

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption. The Assistance and Access Act includes key components that outline ...

How to Create a Comprehensive Cybersecurity Strategy Roadmap for Long-Term Protection

Cyber threats are becoming more frequent, sophisticated, and damaging in today's rapidly evolving digital landscape. Traditional approaches to cyber risk management, which often rely on periodic cyber risk assessments and static data, are no ...

A New Milestone in Code Security: SafeLine WAF

SafeLine is an open-source code security scanning platform developed and maintained by Chaitin Tech. This platform is designed to help…Continue reading on Medium »

Old Habits, New Threats: Why More Phishing Attacks are Bypassing Outdated Perimeter Detection

The rise in sophisticated phishing threats like polymorphic attacks, social engineering tactics, and the use of compromised accounts have undoubtedly highlighted the significant gaps in perimeter technology, leading to a notable increase in ...

Ubuntu Fixes a High-Severity PostgreSQL Vulnerability

PostgreSQL is an open-source, widely used object relational SQL database. However, like any other software, it is not immune to vulnerabilities. A new high-severity vulnerability has been discovered in PostgreSQL versions before PostgreSQL 16.4, ...

Security Budget Growth Slows, but Spending Remains Elevated

The expansion of security budgets has slowed, indicating the end of rapid growth in the sector, according to a survey of 755 CISOs. The post Security Budget Growth Slows, but Spending Remains Elevated appeared first on Security Boulevard.

How to Streamline Your Network Penetration Testing Approach

Technical advances have fundamentally changed the way companies operate and interact with consumers. With the proliferation of mobile technology, social media, and the digitization of business processes, cybersecurity now underpins the health of ...

The Foundation of Zero-Trust Security Architecture

For today’s IT organizations, establishing a zero-trust (ZT) architecture is an ongoing process of refinements for existing networks, resources, methods and security capabilities. The post The Foundation of Zero-Trust Security Architecture ...

Red Hat Enterprise Linux AI extends innovation across the hybrid cloud

Red Hat Enterprise Linux (RHEL) AI is Red Hat’s foundation model platform, enabling users to develop, test, and run GenAI models to power enterprise applications. The platform brings together the open source-licensed Granite LLM family and ...

Parablu’s Guide to 2024 Ransomware Playbook

Parablu’s Guide to 2024 Ransomware Playbook Ransomware incident response is the need of the hour. Let me explain you why-  Ransomware attacks have evolved to become a critical threat in 2024, while recovery from such an attack increased ...

Cobalt Strike Attack: Threat Actors Leverage Phishing Emails

In the cybercrime landscape, Chinese users have been targeted with a new Cobalt Strike attack. Unidentified threat actors behind the campaign leverage phishing email for infecting Windows systems with the payload. In this article, we’ll ...