Application Security News and Articles


The Future of Search Marketing: Beyond Google’s Horizon

As traditional search marketing evolves, cybersecurity companies must embrace a new paradigm that combines AI-driven discovery, interactive tools, and secure platforms. Learn how to leverage multi-platform presence, intent-based search and ...

Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)

Palo Alto Networks has released fixes for two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in its next-generation firewalls that have been exploited by attackers as zero-days. About the vulnerabilities (CVE-2024-0012, CVE-2024-9474) ...

The Elephant in AppSec Talks Highlight: Reinventing API Security

Highlights from Escape's talks at The Elephant in AppSec Conference on the challenges of API security and how Escape is overcoming these The post The Elephant in AppSec Talks Highlight: Reinventing API Security appeared first on Security Boulevard.

Major security audit of critical FreeBSD components now available

The FreeBSD Foundation, in partnership with the Alpha-Omega Project, has released the results of an extensive security audit of two critical FreeBSD components: the bhyve hypervisor and the Capsicum sandboxing framework. The audit, conducted by ...

Smarter AppSec: How ADR, Secure by Design and ‘Shift Smart’ are Redefining Cybersecurity | Application Security Podcast Takeaways | Contrast Security

If there’s one thing Jeff Williams learned from years and years of doing pen testing and threat modeling, it’s this: They're highly time-pressured. The post Smarter AppSec: How ADR, Secure by Design and ‘Shift Smart’ are ...

Strengthening Security and Elevating User Experiences: Introducing Arkose Device ID in an Evolving Threat Landscape

n today’s increasingly digital and interconnected world, traditional security measures — once deemed foolproof — are now being exploited by sophisticated cybercriminals. Whether it’s fake account creation, account takeovers (ATO), session ...

A Look at Our Latest Feature Updates

At Arkose Labs, we’re always pushing boundaries to ensure our customers stay one step ahead of cybercriminals. Our commitment to innovation drives us to continuously enhance our platform, providing you with the capabilities needed to tackle ...

Guarding Your Brand: Why Domain Protection is Essential for Every Business Owner

Protect your business with domain protection. Learn how it prevents cyberattacks, phishing, and data breaches while keeping your personal information secure. The post Guarding Your Brand: Why Domain Protection is Essential for Every Business ...

Security Alert: Fake Accounts Threaten Black Friday Gaming Sales

As Black Friday 2024 nears, online retailers are preparing for a surge in demand, particularly for deals, discounts, and bundles on popular gaming consoles like the PS5, Xbox, and Nintendo Switch, along with their accessories. However, this ...

Extension Functions in Kotlin

Unlocking the Power of Extension Functions in KotlinContinue reading on Medium »

How Veriti Evolves Vulnerability Management Into Exposure Management which we believe aligns with the Gartner® approach 

Effective vulnerability management has moved from a reactive process to a proactive, strategic imperative. Gartner 2024 report, How to Grow Vulnerability Management Into Exposure Management, says “Creating prioritized lists of security ...

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Hold on, let’s guess.  You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of... The post Cloud Pentesting 101: What to Expect from a ...

Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage

With Scytale's new partnership program, MSPs can seamlessly scale compliance offerings to their clients and increase efficiency. The post Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance ...

How Cloud Monitor Helps Centennial School District Combat Account Takeovers

In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 technology staff can use to prepare for hidden digital threats. Our guest speakers Sal Franco, IT Director at Buckeye ...

What Is The Content Delivery & Security Association (CDSA)?

The Content Delivery & Security Association (CDSA) has long been a cornerstone in the media and entertainment industries. It ensures that the highest content security and delivery standards are met. As the digital landscape continues to ...

Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s iconic film or are very familiar with the real-world challenge of ...

Transforming code scanning and threat detection with GenAI

In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting the shift from reactive fixes to proactive risk management. McClure also shares his perspective on the future ...

Why It’s Time to Leave Twitter

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and ...

Evaluating GRC tools

According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM) leaders to be well-versed in distinct pricing tiers of GRC solutions. In this Help Net Security video, ...

ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps

ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Agency (CISA) created to automatically evaluate Microsoft 365 (M365) configurations for potential security gaps. ScubaGear analyzes an organization’s M365 tenant ...