Application Security News and Articles


Wallarm API Attack Surface Management mitigates API leaks

Wallarm announced its latest innovation: API Attack Surface Management (AASM). This agentless technology transforms how organizations identify, analyze, and secure their entire API attack surface. Designed for effortless deployment, Wallarm AASM ...

How Safe is Google Drive? 

Schools store and manage a range of sensitive data: student identification records, tax records, medical documents, financial statements, and more. Often, schools rely on Google Workspace to handle their data appropriately — including Google ...

Top Cybersecurity Risk Mitigation Strategies Every Business Should Implement

In today’s rapidly evolving digital landscape, cybersecurity risks are more prevalent and sophisticated than ever before. Organizations of all sizes are increasingly exposed to many threats, from ransomware attacks and phishing schemes to ...

When Compliance Fails: Eye-Opening Incidents in GRC You Need to Know

In the world of governance, risk, and compliance (GRC), there’s no shortage of incidents that illustrate what can happen when companies fall short of their compliance responsibilities.  In this blog, we’ll present the “best of the worst” ...

How Multifactor Authentication (MFA) Can Reduce Your Cyber Attacks Risk?  

How Multifactor Authentication (MFA) Can Reduce Your Cyber Attacks Risk?   Did it ever cross your mind to ask if your password can defend your sensitive info on the web all by itself? In the digital world of today, where cyber threats are ...

Critical SLUBStick Exploitation Technique Threatens Linux Security

A new and highly-effective cross-cache attack named SLUBStick has emerged, targeting the Linux kernel with a remarkable 99% success rate in transforming a limited heap vulnerability into an arbitrary memory read-and-write capability. This allows ...

Android malware uses NFC to steal money at ATMs

ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM ...

New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971)

A new Chrome zero-day vulnerability (CVE-2024-7971) exploited by attackers in the wild has been fixed by Google. About CVE-2024-7971 CVE-2024-7971 is a high-severity vulnerability caused by a type confusion weakness in V8, the open-source ...

What is Email deliverability testing, and how can it help?

Reading Time: 6 min Frustrated with emails landing in spam? Learn how email deliverability testing helps you reach inboxes and boost campaign success. The post What is Email deliverability testing, and how can it help? appeared first on Security ...

LibreOffice 24.8: More privacy, interoperability improvements

LibreOffice 24.8, the new major release of the free Windows, macOS, and Linux office suite, is now available. This is the first to provide an official package for Windows PCs based on ARM processors. The LibreOffice advantage LibreOffice is the ...

Securing the Future: FIPS 140-3 Validation and the DISA STIG for AlmaLinux OS

FIPS 140-3   In exciting news – TuxCare recently received a CMVP validated certificate for the AlmaLinux 9.2 kernel and is now on the NIST Active list (ahead of Red Hat & Oracle!), we are expecting our OpenSSL certificate soon too. The ...

EasyDMARC Alternative: Why PowerDMARC Stands Out

Reading Time: 7 min EasyDMARC vs PowerDMARC: Which is best for your email security? Compare key differences, features, and pricing to make an informed decision and make the switch! The post EasyDMARC Alternative: Why PowerDMARC Stands Out ...

The Surge of Identity and Access Management (IAM): Unveiling the Catalysts

The Surge of Identity and Access Management (IAM): Unveiling the Catalysts madhav Thu, 08/22/2024 - 07:02 The domain of Identity and Access Management (IAM) has undergone a remarkable surge, underpinned by a myriad of factors spanning ...

Phishing Attacks: Google Drawings And WhatsApp Scam Alert

Cybersecurity researchers at Menlo Security have recently uncovered phishing attacks leveraging Google Drawings and shortened links generated through WhatsApp. The aim of such an attack methodology is to evade detection and trick users into ...

A Fresh Look at Embedded Java

Azul customers use Java on embedded platforms for in-car infotainment and information displays, home automation, and the list goes on. The post A Fresh Look at Embedded Java appeared first on Azul | Better Java Performance, Superior Java ...

The Golden Age of Impersonation: The Dual Role of AI in Cyber Attacks & Cyber Defense    

Attacks today can be executed through a myriad of communication channels, including emails, social media and mobile applications.   The post The Golden Age of Impersonation: The Dual Role of AI in Cyber Attacks & Cyber Defense     ...

3 Cybersecurity Trends for 2025 

By staying informed about emerging cybersecurity trends and investing in robust security measures, organizations can enhance their resilience against cyberattacks.  The post 3 Cybersecurity Trends for 2025  appeared first on Security Boulevard.

Palo Alto Networks Shines Light on Application Services Security Challenge

An analysis published by Palo Alto Networks finds a typical large organization adds or updates over 300 services every month, with those new and updated services being responsible for approximately 32% of new high or critical cloud exposures. The ...

A survival guide for data privacy in the age of federal inaction

Things change fast in the world of data privacy. Just earlier this year, the question I was being asked most frequently was, “How similar will the proposed federal privacy law (APRA) be to the EU’s GDPR?” Now that APRA is pretty much dead ...

Most ransomware attacks occur between 1 a.m. and 5 a.m.

There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock ...