Application Security News and Articles


Russian ‘WhisperGate’ Hacks: 5 More Indicted

Eaten by a GRU: Fake ransomware created by Russian GRU Unit 29155 attacked Ukraine and NATO—a month before the full scale invasion. The post Russian ‘WhisperGate’ Hacks: 5 More Indicted appeared first on Security Boulevard.

Product Updates: Persisted GraphQL Query Support

You can now test the security of persisted GraphQL Queries with Escape's platform. This new capability enhances our GraphQL API security testing The post Product Updates: Persisted GraphQL Query Support appeared first on Security Boulevard.

Navigating Certificate Lifecycle Management in Multi-Cloud Environments

Cryptography and digital certificates form the security backbone of modern digital enterprises. As organizations increasingly adopt multi-cloud strategies to leverage the best services from different cloud providers, they face significant ...

Customer Story | How Porter-Gaud School Built A Better Google Workspace Security Strategy

Porter-Gaud School Takes Student Safety and Data Security in Google Workspace Seriously by Partnering with ManagedMethods Porter-Gaud School in South Carolina is among the premier independent schools in the Southeast United States. It boasts a ...

USENIX Security ’23 – Fairness Properties of Face Recognition and Obfuscation Systems

Authors/Presenters:Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

Exploring the cost savings & business benefits of Sectigo Certificate Manager

Digital certificates are key to modern web security, and automating their deployment and renewals can greatly enhance their potential. A recent Forrester study commissioned by Sectigo reveals that automating certificate lifecycle management (CLM) ...

Understanding the Types of Cybersecurity Breaches

What are the different types of cybersecurity breaches, and what can your organization do to protect against them? Cybersecurity breaches have been a top concern for organizations and individuals across the world. An independent study found that ...

Exposed: Russian military Unit 29155 does digital sabotage, espionage

The US Department of Justice has named five Russian computer hackers as members of Unit 29155 – i.e., the 161st Specialist Training Center of the Russian General Staff Main Intelligence Directorate (GRU) – which they deem resposible ...

Summer compliance webinar series: Understanding DORA compliance

In the third part of our Summer of Software Regulations & Compliance webinar series, the Digital Operations Resilience Act (DORA) took center stage with Ilkka Turunen, Field CTO at Sonatype joining Friso Schutte, the CTO of fintech leader ...

Cybersecurity Insights with Contrast CISO David Lindner | 9/6/24

Insight #1:  SQL injection baffles airport security  You mean to say that SQL Injection is still a problem? How many more of these have to happen before we realize there are control layers we can add to our security stack to prevent SQL ...

BIMI Setup Guide for Zoho Mail – Getting the Blue Verified Checkmark

Reading Time: 3 min Configure BIMI for Zoho Mail and display your brand logo with a verified checkmark! Boost brand trust with Zoho BIMI. The post BIMI Setup Guide for Zoho Mail – Getting the Blue Verified Checkmark appeared first on Security ...

Embracing Soren Kierkegaard’s Philosophy in Cybersecurity

Moving Beyond the Aesthetic Life of Superficial Security  Let’s talk about the cybersecurity life you lead. I bet you often find yourself trapped in a cycle of superficial solutions and temporary fixes. This cycle mirrors what the Danish ...

Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195)

For the fourth time in the last five months, Apache OFBiz users have been advised to upgrade their installations to fix a critical flaw (CVE-2024-45195) that could lead to unauthenticated remote code execution. About CVE-2024-45195 Apache OFBiz ...

NIST CSF 2.0 Cyber Security Framework

NIST has released Version 2.0 of its widely used Cybersecurity Framework (CSF), a guidance document for mitigating cybersecurity risks. This update is not just a revision but a transformative approach to secure digital assets and infrastructures. ...

Cequence Security partners with Netskope to provide protection for business-critical APIs

Cequence Security announced a new partnership with Netskope. Through the partnership, Netskope customers can now leverage unique API threat intelligence from the Cequence Unified API Protection (UAP) platform to unlock insights into real-world ...

Resecurity gains recognition in Frost & Sullivan’s 2024 Cyber Threat Intelligence report

Resecurity announced its recognition in the prestigious Frost & Sullivan’s Global Cyber Threat Intelligence 2024 report. This annual report is an essential indicator of market trends and highlights the most influential vendors and tools ...

Beyond End of Life: Securing Legacy Linux Systems Like CentOS 7

The lifecycle of software inevitably draws to a close, leaving many organizations grappling with the challenges of upgrading legacy systems. For Linux users, particularly those reliant on CentOS 7 and CentOS Stream 8, the recent end-of-life (EOL) ...

Veza and HashiCorp join forces to help prevent credential exposure

Veza announced a partnership with HashiCorp to deliver an integrated solution for solving modern identity security challenges. Together, the Veza Access Platform and HashiCorp Vault empower joint customers to strengthen their identity security ...

Why and How to Secure GenAI Investments From Day Zero

A healthy approach to GenAI is one in which organizations build security protections from the start. Here are tips on how to integrate security into your organization's GenAI strategy from day zero. The post Why and How to Secure GenAI ...

WEB APPLICATION SECURITY

What is web application securityContinue reading on Medium »