Application Security News and Articles


Food security: Accelerating national protections around critical infrastructure

In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures. ...

Average DDoS attack costs $6,000 per minute

2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack duration increases DDoS attacks surged 106% from H2 2023 to H1 2024. ...

Why I Joined Balbix: Embracing the AI-Powered Future of Cybersecurity

After spending over 15 years in the cybersecurity field, working across various roles, and witnessing the evolution of cyber threats, I’ve developed a deep passion for protecting organizations from ever-evolving digital risks. My journey has ...

Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event

Black Hat 2024 tackled global challenges, briefings that dived into the depths of emerging threats, and an undeniable focus on data breaches. The post Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event appeared first on ...

USENIX Security ’23 – CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations

Authors/Presenters:Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Identity Crisis: Hidden Threats In Digital Infrastructure

Identities are both the weapons and the targets. Without vigilant protection and strategic oversight, identities can be gateways to your crown jewels. The post Identity Crisis: Hidden Threats In Digital Infrastructure appeared first on Security ...

What You Get with AKS, EKS, GKE vs. Managed Kubernetes-as-a-Service

Managed Kubernetes is a service offered by cloud providers, such as Amazon Web Services (AWS), Microsoft Azure (Azure), and Google Cloud Platform (GCP) that simplifies the deployment, management, and scaling of Kubernetes clusters. These cloud ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #304 – Fail Fast

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Agentless is a DAM Better Option for Securing Cloud Data

When it comes to on-premises database activity monitoring (DAM), security teams have consistently relied on agents to seamlessly track all incoming requests and outgoing responses within the databases. The agent-based approach effectively ensures ...

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Ignoring low-risk secrets in GitGuardian? This could be a costly mistake. Learn how to avoid the hidden dangers of prematurely closing incidents. The post From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents ...

INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training

Cary, North Carolina, 20th August 2024, CyberNewsWire The post INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training appeared first on Security Boulevard.

USENIX Security ’23 – Pspray: Timing Side-Channel Based Linux Kernel Heap Exploitation Technique

Authors/Presenters:Yoochan Lee and Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Navigating the Uncharted: A Framework for Attack Path Discovery

This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, “How does one discover and abuse new attack paths?” To start ...

New phishing method targets Android and iPhone users

ESET researchers discovered an uncommon type of phishing campaign targeting Android and iPhone users. They analyzed a case observed in the wild that targeted clients of a prominent Czech bank. PWA phishing flow (Source: ESET) This technique is ...

Cybersecurity’s workforce woes are a myth: 5 ways to rethink recruiting

The threat landscape is more challenging than ever, and the cybersecurity workforce is dogged by overwork and burnout. No wonder there's a cybersecurity talent shortage. Or is there? The post Cybersecurity’s workforce woes are a myth: 5 ...

Embracing Zero Trust: DoD’s New Cybersecurity Paradigm (Part 2)

The Department of Defense's (DoD) approach to Zero Trust leverages automation and analytics using tailored controls to address risk. In part two of our series on the DoD's Zero Trust security model, we continue to explore the crucial framework ...

Fortanix protects individual file systems on specified hosts

Fortanix announced a major enhancement to its Fortanix Data Security Manager (DSM): File System Encryption. This new feature complements full disk encryption with the ability to protect individual file systems on specified hosts through ...

Podcast Episode 18: From Application Developer to CEO: Greg Samuels on Entrepreneurial Success and Cybersecurity Priorities

Have you ever wondered what it takes to transition from a routine job to leading a successful company? Join us for a compelling conversation with Greg Samuels, CEO of Salveria, as he shares his extraordinary journey from an application developer ...

A Comprehensive Outlook on OT Asset Inventory Management

Cybersecurity concerns in operational environments have also heightened the importance of asset inventory management. The November 2023 Aliquippa water plant in Pennsylvania cyberattack, which managed to access and shut down a pressure regulation ...

Leveraging OT Asset Inventory for Operational Excellence: The Benefits

To put it in simple words, it’s an all-inclusive catalog of all your hardware, software, and network components. Far from being just a list, this inventory is the backbone of efficient operations, robust security, and smart decision-making. ...