Application Security News and Articles


Optimizing SBOM sharing for compliance and transparency

As software development continues to evolve, the critical need for transparent and secure practices in software supply chains remains constant. The post Optimizing SBOM sharing for compliance and transparency appeared first on Security Boulevard.

A misuse of Spamhaus blocklists: PART 2 – How to limit outbound spam

If you’ve skipped the first part of this series, we strongly recommend you go and read this blog first to understand the misuse of Spamhaus blocklists to block outbound mail. However, if you provide a mail service and want to learn specifically ...

BlackByte affiliates use new encryptor and new TTPs

BlackByte, the ransomware-as-a-service gang believed to be one of Conti’s splinter groups, has (once again) created a new iteration of its encryptor. “Talos observed some differences in the recent BlackByte attacks. Most notably, ...

Fortinet introduces sovereign SASE and GenAI capabilities

Fortinet announced the addition of sovereign SASE and GenAI capabilities to its unified SASE solution. Fortinet Unified SASE provides complete integration between Fortinet’s Secure SD-WAN solution and cloud-delivered security service edge (SSE) ...

The Risks Lurking in Publicly Exposed GenAI Development Services

Get our research team's analysis of the security of GenAI development services. The post The Risks Lurking in Publicly Exposed GenAI Development Services appeared first on Security Boulevard.

HYCU for Microsoft Entra ID provides organizations with automated, policy-driven backups

HYCU announced significant updates to its HYCU R-Cloud data protection platform that offers customers additional protection for their Identity and Access Management (IAM) solutions with support for Microsoft Entra ID. With this announcement, ...

APT group exploits WPS Office for Windows RCE vulnerability (CVE-2024-7262)

ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). APT-C-60, a South Korea-aligned cyberespionage group, was exploiting it to target East Asian countries. When examining the root cause, ...

Critical Fortra FileCatalyst Workflow vulnerability patched (CVE-2024-6633)

Organizations using Fortra’s FileCatalyst Workflow are urged to upgrade their instances, so that attackers can’t access an internal HSQL database by exploiting known static credentials (CVE-2024-6633). “Once logged in to the ...

Broadcom Extends VMware Cybersecurity Portfolio

Broadcom today at the VMware Explore 2024 conference extended its VMware vDefend portfolio to include generative artificial intelligence (AI) capabilities in addition to extending its software-defined edge computing portfolio to provide deeper ...

WebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways

‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpoint At DEF CON 32, SquareX presented groundbreaking research curating vulnerabilities in Secure Web Gateways (SWGs) that leave ...

Expel partners with Wiz to enhance security for cloud environments

Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and ...

What is binary compatibility, and what does it mean for Linux distributions?

  Applications are typically tested and guaranteed to function on specific Linux distributions, but may work on others as well. Kernel versions, libraries, and system calls are key factors affecting binary compatibility between distributions. ...

Embracing Private Cloud Web Security with NSFOCUS vWAF

In the digital age, the cloud has become the cornerstone of business operations, heralding a new era of innovation and efficiency. However, with the shift to cloud-based infrastructures, particularly private clouds, organizations are facing a new ...

Microsoft Security Update: 90 Critical Vulnerabilities Fixed

As a part of the Microsoft security update, the tech giant had released several fixes to address 90 critical security flaws. Reports claim that 10 of them have zero day vulnerabilities and 6 out of these 10 have fallen prey to threat actor ...

Top 7 Questions to Ask Cybersecurity Service Providers

Choosing the correct cybersecurity service provider is critical for any business in today’s digital world. Rather than selecting a vendor, due diligence is required to secure your data, systems, and networks. To help you make your choice, here ...

Cryptomator: Open-source cloud storage encryption

Cryptomator offers open-source, client-side encryption of your files in the cloud. It’s available for Windows, Linux, macOS and iOS. Cryptomator works with Dropbox, Google Drive, OneDrive, MEGA, pCloud, ownCloud, Nextcloud, and any other ...

Cybersecurity jobs available right now: August 28, 2024

Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS ...

Cybercriminals capitalize on travel industry’s peak season

Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to ...

Old methods, new technologies drive fraud losses

GenAI, deepfakes and cybercrime are critical threats putting intensifying pressures on businesses, according to Experian. Top online security concerns for consumers According to the FTC, consumers reported losing more than $10 billion to fraud in ...

Scott Kannry on the What’s Up with Tech? Podcast

In a recent conversation with Evan Kirstel on the What’s Up with Tech? podcast, Axio CEO Scott Kannry discussed the intersection of cybersecurity and risk management, highlighting the unique approach Read More The post Scott Kannry on the ...