Application Security News and Articles


Another critical SolarWinds Web Help Desk bug fixed (CVE-2024-28987)

A week after SolarWinds released a fix for a critical code-injection-to-RCE vulnerability (CVE-2024-28986) in Web Help Desk (WHD), another patch for another critical flaw (CVE-2024-28987) in the company’s IT help desk solution has been ...

Escape vs Rapid7

Discover why Escape is a better API security solution. The post Escape vs Rapid7 appeared first on Security Boulevard.

The Risks of Running an End Of Life OS – And How To Manage It

EOL operating systems no longer receive critical security updates, leaving them highly vulnerable to evolving cybersecurity threats. End-of-life OSs often struggle to run modern software and hardware, resulting in compatibility issues, reduced ...

Drawbridge expands cyber risk assessment service

Drawbridge released its next generation cyber risk assessment service. Provided as a suite of modules, the solution combines a set of analytics with Drawbridge’s client service. Clients can now benchmark and score their cyber programs to ...

What is ISO 27018? Importance of Protecting PII in Cloud?

ISO 27018 is an international standard for the protection of Personally Identifiable Information in cloud computing environments. However, unlike the broad scope of the ISO/IEC 27001 standard, it goes further to provide detailed and specific ...

BlackSuit Ransomware Threat Actors Demand Up To $500 Million

According to an updated advisory from the United States (US) Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation (FBI), the BlackSuit ransomware strain is known to have had demands totaling up to $500 million ...

Cyber Resilience Lacking, Organizations Overconfident

There are significant gaps in cyber resilience, despite growing confidence in organizational strategies, according to a Cohesity survey of 3,100 IT and security decision-makers across eight countries. The post Cyber Resilience Lacking, ...

Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or ...

Fraud tactics and the growing prevalence of AI scams

In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107 million spam calls everyday. The data showed spam flag rates of more than 20% of unknown calls (calls coming from outside of someone’s ...

The changing dynamics of ransomware as law enforcement strikes

After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets, and industry dynamics, according to WithSecure. Sectors impacted by ransomware (Source: WithSecure) ...

New infosec products of the week: August 23, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd, and Wallarm. Own proactively detects and stores data changes in Salesforce Continuous Data Protection from ...

How we improved vulnerability prioritization with machine learning

It’s easy to find vulnerabilities. It’s harder to prioritize and fix them.  So far in 2024, there has been an average of over 110 CVEs disclosed per day. Compounded with all the vulnerabilities disclosed in the last two decades, security ...

The Growing Challenge of Headless Browser Attacks: How to Defend Your Digital Assets

In the escalating battle against malicious headless bots, basic detection methods are no longer sufficient. As cybercriminals refine their techniques and leverage headless browsers to automate attacks with increasing sophistication, the need for ...

How Swimlane Can Help SOC Management

The post How Swimlane Can Help SOC Management appeared first on AI-enhanced Security Automation. The post How Swimlane Can Help SOC Management appeared first on Security Boulevard.

News alert: INE Security launches initiatives in support of aspiring cybersecurity professionals

Cary, NC, Aug. 22, 2024, CyberNewsWire — INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing campaign to invest in the education of ...

What is Application Security Posture Management (ASPM)

Application Security Posture Management (ASPM) is a strategy designed to unify and improve the security of your applications. It pulls together various security practices, like static application security testing (SAST), software composition ...

USENIX Security ’23 – ZBCAN: A Zero-Byte CAN Defense System

Authors/Presenters:Khaled Serag, Rohit Bhatia, Akram Faqih, and Muslum Ozgur Ozmen, Purdue University; Vireshwar Kumar, Indian Institute of Technology, Delhi; Z. Berkay Celik and Dongyan Xu, Purdue University Many thanks to USENIX for ...

A Crash Course on Hyperproof’s GRC Maturity Model

Something has been missing in the governance, risk, and compliance (GRC) space: the ability to truly understand an organization’s GRC maturity and the steps it would take to build the business case for change. As a CISO, I was surprised to find ...

Report: Manufacturing Remains Atop Cyberattack Leader Board

A report published today by Critical Start, a provider of managed cybersecurity services, finds cyberattacks in the first half of 2024 continued to focus on vertical industries that are rich in critical data that can either be encrypted or ...

Streamline Your Cybersecurity and Lower Costs with Seceon’s OTM Platform

Modernize Your Cybersecurity and Lower Costs with Seceon’s OTM Platform The post Streamline Your Cybersecurity and Lower Costs with Seceon’s OTM Platform appeared first on Seceon. The post Streamline Your Cybersecurity and Lower Costs with ...