Application Security News and Articles


AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden instructions that are executed by connected system components. This is ...

OpenZiti: Secure, open-source networking for your applications

OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network OpenZiti features “We created OpenZiti to transform how people think about connectivity. ...

Best practices for implementing the Principle of Least Privilege

In this Help Net Security interview, Umaimah Khan, CEO of Opal Security, shares her insights on implementing the Principle of Least Privilege (PoLP). She discusses best practices for effective integration, benefits for operational efficiency and ...

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors

This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, ...

Phishing in focus: Disinformation, election and identity fraud

The frequency of phishing attacks is rising as attackers increasingly utilize AI to execute more scams than ever before. In this Help Net Security video, Abhilash Garimella, Head Of Research at Bolster, discusses how phishing scams are now being ...

End of an era: Security budget growth slows down

Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico Search. Security budgets are also affected by these realities with ...

USENIX Security ’23 – Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels

Authors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, ...

Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) ...

USENIX Security ’23 – (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

Authors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating ...

Mobile App Security

Whether we are developing a B2B or a B2C app, designing our mobile app security should always be the first step. If our app is consuming…Continue reading on Medium »

Protecting NATO Secret and Foreign Government Information

We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected ...

Let’s create a SAST … sort of.

In simple words, this article explored the intricacies of SAST (Static Application Security Testing) using our micro SAST, which I…Continue reading on Medium »

Talking DSPM: Episode 4 – Dr. Mohit Tiwari

I’m Mohit Tiwari. I’m one of the co-founders of Symmetry Systems, and the CEO. Symmetry was spun out of Spark... The post Talking DSPM: Episode 4 – Dr. Mohit Tiwari appeared first on Symmetry Systems. The post Talking DSPM: Episode 4 – ...

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing legitimate security software tools to run cyber campaigns against organizations. The post Threat ...

Unify & Conquer: How Open XDR Streamlines Your Security Operations

In today’s rapidly evolving cybersecurity landscape, staying ahead of threats requires innovation, agility, and robust partnerships. At Assura, we’re dedicated to providing our clients with the most advanced and effective cybersecurity ...

Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option

Gary Perkins, Chief Information Security Officer In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this ...

Fintech Compliance and How to Maintain It

Fintech compliance requires vigilance, proactive measures, and a deep understanding of regulations. Overall, regulation seeks to protect consumers, ensure financial stability, and prevent financial crimes — but it can be extremely complex. ...

USENIX Security ’23 – GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI

Authors/Presenters:Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou Wenyuan Xu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

SafeBreach Coverage for AA24-249A (GRU Unit 29155)

GRU Unit 29155 is well known for carrying out cyber attacks with the sole purpose of espionage, sabotage, and reputational harm. The post SafeBreach Coverage for AA24-249A (GRU Unit 29155) appeared first on SafeBreach. The post SafeBreach ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #305 – Two Full Days on Big Room Planning

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...