Application Security News and Articles


A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9

Data breaches reached a record high in the US last year, impacting over 350 million individuals. According to one estimate, financial services firms suffered the second highest total of breaches in 2023: 744. It’s not hard to imagine why. In ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy

Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, ...

Major cyber attacks and data breaches of 2024

As 2024 draws to a close, the cybersecurity landscape continues to evolve, marked by both familiar adversaries and emerging threats with newer technologies and improved tactics. Rather than merely cataloguing breaches, we look into the anatomy of ...

NIST is chipping away at NVD backlog

The National Institute of Standards and Technology (NIST) is clearing the backlog of unprocessed CVE-numbered vulnerabilities in the National Vulnerability Database (NVD), but has admitted that their initial estimate of when they would finish the ...

Attestations: A new generation of signatures on PyPI

Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These ...

VersaONE unifies security and networking into a single, centrally managed platform

Versa introduced the VersaONE Universal SASE Platform to enhance security and networking capabilities across WAN, LAN, data centers, and cloud. Powered by AI, VersaONE delivers converged SASE, SSE, SD-WAN, and SD-LAN products via a unified ...

Microsoft Power Pages: Data Exposure Reviewed

Learn about a data exposure risk in Microsoft Power Pages due to misconfigured access controls, highlighting the need for better security and monitoring. The post Microsoft Power Pages: Data Exposure Reviewed appeared first on AppOmni. The post ...

To Pay or Not to Pay: The Ransomware Dilemma

Disclaimer: In the majority of cases, the determination of whether or not to pay a ransom is a business decision, […] The post To Pay or Not to Pay: The Ransomware Dilemma appeared first on Security Boulevard.

Google launches on-device AI to alert Android users of scam calls in real-time

Google has announced new security features for Android that provide real-time protection against scams and harmful apps. These features, powered by advanced on-device AI, enhance user safety without compromising privacy. These new security ...

The Elephant in AppSec Conference: 4 Key Takeaways

Here are the key takeaways from the Elephant in AppSec Conference, uncovering the top insights from industry experts in application security. The post The Elephant in AppSec Conference: 4 Key Takeaways appeared first on Security Boulevard.

FBI confirms China-linked cyber espionage involving breached telecom providers

After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the ...

Understanding IP Reputation: Why It Matters for Your Business and How to Improve It

Learn what is IP reputation and what kinds of causes can bring poor reputation. Check out the benefits and improvement ideas for better IP reputation for your business. The post Understanding IP Reputation: Why It Matters for Your Business and ...

The Magic ITAM Formula for Navigating Oracle Java Licensing

IT asset managers have their hands full when they’re trying to strike the best path forward for their companies’ use of Java. Finance leaders at many companies are turning to ITAM professionals and asking them to reduce the cost of Java with ...

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)

CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on November 2024 Patch Tuesday, has been exploited since at least April 2024, ClearSky researchers have revealed. About the vulnerability CVE-2024-43451 affects ...

Red Hat Enterprise Linux 9.5 helps organizations simplify operations

Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across ...

Best 7 Compliance Risk Assessment Tools for 2024

Organizations devote significant resources to their compliance risk assessments each year. Yet many compliance leads and senior executives feel stuck in a cycle of repetition and question whether these efforts yield meaningful benefits.  Do you ...

Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage

Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of ...

How Intel is making open source accessible to all developers

In this Help Net Security interview, Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel, discusses the company’s commitment to fostering an open ecosystem as a cornerstone of its software strategy. He explains how this ...

OnDMARC by Red Sift Alternatives: Top Alternatives and Competitors

Seeking a robust Red Sift OnDMARC alternative? Explore top 10 options for advanced DMARC protection. Enhance email security and deliverability. The post OnDMARC by Red Sift Alternatives: Top Alternatives and Competitors appeared first on Security ...

Zero-days dominate top frequently exploited vulnerabilities

A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious ...