Application Security News and Articles


A macro look at the most pressing cybersecurity risks

Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to ...

Sinon: Open-source automatic generative burn-in for Windows deception hosts

Sinon is an open-source, modular tool for the automatic burn-in of Windows-based deception hosts. It aims to reduce the difficulty of orchestrating deception hosts at scale while enabling diversity and randomness through generative capabilities. ...

Cyber threats that shaped the first half of 2024

Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five years. To identify the most urgent cybersecurity threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU) analyzed ...

New infosec products of the week: August 30, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Bitwarden, Dragos, Fortinet, HYCU, and Rezonate. Fortinet introduces sovereign SASE and GenAI capabilities Fortinet announced the addition of sovereign ...

Who Owns Implementation of California’s New Workplace Violence Prevention Law?

Managing compliance takes a collaborative effort from several different departments, but security teams are uniquely positioned to lead the collaboration This article was originally posted in ASIS Security Management Magazine. Employers in ...

Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives

Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have at least used it once. In fact, Google reports handling ...

USENIX Security ’23 – RøB: Ransomware over Modern Web Browsers

Authors/Presenters:Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, Selcuk Uluagac Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

Shining a Light on Shadow AI: What It Is and How to Find It

Find out more about shadow AI and the risks of leaving it uncovered. The post Shining a Light on Shadow AI: What It Is and How to Find It appeared first on Security Boulevard.

TrustCloud Product Updates: August 2024

Our teams are always hard at work improving the TrustCloud platform. Here are this month’s biggest updates. Introducing our ServiceNow integration! This is a bidirectional integration with ServiceNow to pull ticket details into TrustCloud. ...

Hunting Specula C2 Framework and XLL Execution

Specula is a framework that allows for interactive operations of an implant that runs purely in the context of Outlook. It works by setting a custom Outlook homepage via registry keys that calls out to an interactive python web server. This web ...

Daniel Stori’s ‘Linux Top Explained’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘Linux Top Explained’ appeared first on Security Boulevard.

The Role of AI in Enhancing Patient Experience in HealthTech

Artificial Intelligence (AI) is revolutionizing healthcare, and its impact on patient experience is nothing short of transformative. According to a study by Accenture, AI applications...Read More The post The Role of AI in Enhancing Patient ...

The AppViewX Experience: A Journey to Seamless Solution Onboarding

In today’s digital world where availability and security are of the utmost importance, time is of the essence. We know how important it is for our customers to get up and running with the solutions they chose from AppViewX as quickly as ...

Manufacturing Security Vulnerabilities: Combating the Risks

Threat actors increasingly target industrial processes because of the costly and sometimes dangerous disruptions they can cause in OT environments. Making adversaries’ jobs easier are continued manufacturing security vulnerabilities that both ...

Elevating your secrets security hygiene: H1 roundup of our product innovations

Discover how GitGuardian's latest product innovations enhance your secrets security, streamline remediation, and improve incident management for better protection of your software supply chain. The post Elevating your secrets security hygiene: H1 ...

USENIX Security ’23 – RøB: Ransomware over Modern Web Browsers

Authors/Presenters:Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, Selcuk Uluagac Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

Why Application Detection and Response (ADR) is Exciting for Cybersecurity | Contrast Security

What is it about the rise of application detection and response (ADR) that’s exciting cybersecurity experts? The post Why Application Detection and Response (ADR) is Exciting for Cybersecurity | Contrast Security appeared first on Security ...

4 Key Requirements for APRA CPS 234 Compliance [+ CHECKLIST]

The CPS 234 Information Standard, established by the Australian Prudential Regulation Authority (APRA), mandates that organizations in the financial and insurance industries bolster their information security frameworks to safeguard themselves ...

Rain Technology Laptop Switchable Privacy protects against visual hackers and snoopers

Rain Technology has introduced Laptop Switchable Privacy. Designed for tier one manufacturers and supply chain providers, the embedded screen technology protects against visual hackers and snoopers for enterprises and consumers — at the office ...

Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites

Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 ...