Application Security News and Articles


Scott Kannry on the What’s Up with Tech? Podcast

In a recent conversation with Evan Kirstel on the What’s Up with Tech? podcast, Axio CEO Scott Kannry discussed the intersection of cybersecurity and risk management, highlighting the unique approach Read More The post Scott Kannry on the ...

Not a SOC FAQ! This is SOC FMD!

Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past: If you run a SOC (or an equivalent D&R team), what things should you require (demand, request, ask, beg … depending ...

Facebook Whistleblower Fears Election Abuse

Frances Haugen, who famously blew the whistle on Facebook and its susceptibility to manipulation, has renewed concerns over the social-networking company. This time, she’s laser-focused on misinformation during the 2024 presidential ...

How Security Teams are Strengthening Their Threat Hunting

According to "Voice of a Threat Hunter 2024" Security teams need to keep evolving their strategies to protect their organizations against... The post How Security Teams are Strengthening Their Threat Hunting appeared first on Security Boulevard.

Windows Downdate Attacks, Quick Share Vulnerability Exploit, and More: Hacker’s Playbook Threat Coverage Round-up: August 2024

New and updated coverage for Windows Downdate Attacks, Quick Share Vulnerability Exploit, MagicRAT, and More The post Windows Downdate Attacks, Quick Share Vulnerability Exploit, and More: Hacker’s Playbook Threat Coverage Round-up: August 2024 ...

USENIX Security ’23 – Extracting Protocol Format As State Machine Via Controlled Static Loop Analysis

Authors/Presenters:Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

How fernao magellan Customized 140 Automation Use Cases

The post How fernao magellan Customized 140 Automation Use Cases appeared first on AI-enhanced Security Automation. The post How fernao magellan Customized 140 Automation Use Cases appeared first on Security Boulevard.

The Urgent Need to Get MOVING for PCI DSS v4.0 Compliance

With the March 2025 deadline for PCI DSS v4.0 compliance looming, businesses face the challenge of adapting to over 50 new security requirements. Among these, eSkimming protections are crucial for safeguarding online transactions. Time is running ...

Seeing the Unseen: How Generative AI Elevates Situational Awareness in Cybersecurity

Situational awareness in cybersecurity is hard! And poor situational awareness can be disastrous in cybersecurity. For a CISO, it could mean missing acting on a critical gap in the security program, leading to a data breach that damages the ...

‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize. The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared ...

So-Phish-ticated Attacks

August 27, 2024 Authors: Rui Ataide, Hermes Bojaxhi The GuidePoint Research and Intelligence Team (GRIT) has been tracking a highly […] The post So-Phish-ticated Attacks appeared first on Security Boulevard.

One-Third Of Companies Suffered SaaS Breach This Year

SaaS breaches are on the rise, and nearly half the corporate victims have more than 2,500 employees. Those are among the sobering conclusions from a survey of security experts at 644 organizations in six countries — the U.S., UK, France, ...

Daniel Stori’s ‘XZ Backdoor’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘XZ Backdoor’ appeared first on Security Boulevard.

How to Strengthen Your SaaS Security Posture Management

SaaS Security Posture Management is important to SaaS security. Learn how to mitigate identity risks and protect your SaaS environment more effectively. The post How to Strengthen Your SaaS Security Posture Management appeared first on Security ...

What’s New in CJIS 5.9.5 as it Relates to Firmware Security?

The Criminal Justice Information Services (CJIS) is a division of the US Federal Bureau of Investigation (FBI) that is the centralized source of criminal justice information (CJI) for state, local, and federal law enforcement and criminal justice ...

Versa Director zero-day exploited to compromise ISPs, MSPs (CVE-2024-39717)

Advanced, persistent attackers have exploited a zero-day vulnerability (CVE-2024-39717) in Versa Director to compromise US-based managed service providers with a custom-made web shell dubbed VersaMem by the researchers. The malware harvests ...

Ghostwriter ❤ Tool Integration

Incorporating new components into existing systems is such a pain, this process has been labeled “Integration Hell”. To ease tool integration, Ghostwriter v3.0.0 shipped with a GraphQL API. This API allows outside entities to easily query and ...

DigitalOcean unveils enhanced role-based access control

DigitalOcean announced updates to its role-based access control (RBAC), a method for managing user access to systems and resources within an organization by assigning permissions to roles rather than to individual users. This updates are ...

What is RBAC (Role-Based Access Control) and Why is it Important?

A pivotal part of meeting security, privacy and compliance challenges in increasingly complex IT environments is having a secure access control method. Imagine a software engineer who typically works in development or staging environments has ...

5 Key Takeaways: Ransomware Attacks on Healthcare, Education, and Public Sector

Ransomware has rapidly escalated from being a financial nuisance to a significant, multi-dimensional threat that jeopardizes the core of our most essential services. Sectors like healthcare, education, and government are particularly vulnerable, ...