Application Security News and Articles


DataDome Releases Fastly Compute Server-Side Integration

Our new Fastly Compute server-side integration is the latest in a range of 50+ integrations that ensure DataDome stops bad bots & fraud on any infrastructure. The post DataDome Releases Fastly Compute Server-Side Integration appeared first on ...

Special Bulletin: US Election Phishing Alert

Threat Intelligence Report Date: August 28, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS As the US election approaches, the surge in political activity and heightened public interest make it an attractive target ...

Vulnerabilities in C# Source Code

C# is widely used in enterprise applications, web development, and desktop applications. Its robust framework and integration capabilities…Continue reading on Medium »

China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target

Xi whiz: Versa Networks criticized for swerving the blame. The post China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target appeared first on Security Boulevard.

Pioneer Kitten: Iranian hackers partnering with ransomware affiliates

A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ...

Badge Life: The CISO Team Takes on DEF CON

The CISO Global Pen Testing Team Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking world at DEFCON 32 in Las Vegas. This annual pilgrimage to the ...

Mastering API Compliance in a Regulated World

As we continue our Summer School blog series, let's focus on a vital aspect of modern application security: the relationship between API posture governance, API security, and the constantly changing regulatory compliance landscape. In today's ...

Veeam Data Platform 12.2 extends data resilience to more platforms and applications

Veeam Software released Veeam Data Platform v12.2, broadening support for protecting data on an extensive range of new platforms while continuing to advance end-to-end cybersecurity capabilities. This latest release combines the most ...

The Role of Automation in Protecting Email Systems

Reading Time: 4 min Discover how automation has revolutionized email security. Learn about the benefits of AI, threat intelligence, and tools like PowerDMARC in safeguarding your inbox from phishing, spam, and malware. The post The Role of ...

AuthenticID enhances Smart ReAuth to combat AI-based attacks and account takeovers

AuthenticID announced the newest release of Smart ReAuth. Smart ReAuth is a reauthentication solution that leverages a selfie to re-confirm an identity. First released in 2021, this enhanced version offers verifications in less than one second, ...

SOC 2 vs. SAS 70: A Comprehensive Comparison

Discover the key differences between SOC 2 and SAS 70, and learn why SOC 2 is the modern standard for ensuring data security and compliance. The post SOC 2 vs. SAS 70: A Comprehensive Comparison appeared first on Scytale. The post SOC 2 vs. SAS ...

Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience

Diligent launched its Network and Information Security Directive (NIS2) Compliance Toolkit, designed to help organizations navigate the complexities of the European Union (EU) NIS2 Directive and bolster their cybersecurity resilience. The toolkit ...

Top 10 Lessons Learned from Managing Kubernetes from the Trenches

Welcome to our deep dive into the world of Kubernetes, where we share some of the top lessons our site reliability engineers (SREs) have learned from years of managing this complex yet essential cloud-native technology. During a recent Kubernetes ...

Quantum Computing and the Risk to Classical Cryptography

The recent standardization of first three post-quantum cryptography (PQC) encryption and digital signature algorithms by the U.S. National Institute of Standards and Technology (NIST) has officially kicked off the race to PQC readiness. In its ...

Rezonate’s mid-market solution reduces the cloud identity attack surface

Rezonate announced a new identity security solution for mid-market companies. The offering proactively reduces the identity attack surface and improves compliance efforts in a fraction of the time of legacy IAM tools or manual methods. This ...

We Celebrate Our Customers’ Successes with Java

Azul announced Java Hero Awards for 17 organizations and individuals who have achieved innovative world-class results with Java. The post We Celebrate Our Customers’ Successes with Java appeared first on Azul | Better Java Performance, ...

Dragos Platform updates streamline OT threat and vulnerability workflows

Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in ...

Oregon Zoo Data Breach Exposes Payment Card Information

The Oregon Zoo's recent data breach serves as a stark reminder of the urgent need for robust cybersecurity measures in today's digital landscape. With over 117,000 payment card details potentially compromised, this incident underscores the ...

Strengthening API Security with AppSentinels Integration in the Strobes Platform

APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post Strengthening API Security with AppSentinels ...

Fortinet Debuts Sovereign SASE, Updates Unified SASE With FortiAI

Security specialist Fortinet announced the debut of Sovereign SASE and the integration of Generative AI (GenAI) technology into its Unified SASE offering. The post Fortinet Debuts Sovereign SASE, Updates Unified SASE With FortiAI appeared first ...