Application Security News and Articles


Unleashing the Power of API Security: Join Our API Bites Bootcamp Series

API Security: A 2024 Initiative for All Organizations In the rapidly evolving digital landscape, API security has emerged as a top priority for organizations of all sizes. Protecting your APIs is not just about defense; it’s about staying ahead ...

Survey Surfaces Widespread Mishandling of Sensitive Data

Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business ...

0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)

CVE-2024-38193, an actively exploited zero-day that Microsoft patched earlier this month, has been leveraged by North Korean hackers to install a rootkit on targets’ computers, Gen Digital researchers have revealed. About CVE-2024-38193 ...

Vulnerabilities in Microsoft macOS apps may give attackers access to microphone, camera

Vulnerabilities in popular Microsoft apps for macOS can be abused by attackers to record video and audio clips, take pictures, access and exfiltrate data and send emails, Cisco Talos researchers have discovered. Library injection vulnerabilities ...

Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations? The post Overturning of Chevron Deference’s Impact on Cybersecurity Regulation appeared first on Security Boulevard.

GuidePoint Security releases Phishing as a Service

GuidePoint Security has launched a new Phishing as a Service (PhaaS) offering. Phishing remains one of the most common entry points for threat actors – according to CISA, over 90% of successful cyberattacks start with a phishing email. However, ...

Security Alert: U.S. Political Donation Sites at Risk

As the U.S. election nears, DataDome's assessment shows two-thirds of U.S. donation sites lack adequate bot protection, risking donor data and contributions. The post Security Alert: U.S. Political Donation Sites at Risk appeared first on ...

Multi-Domain vs Wildcard SSL Certificates: Differences & Uses

Digital certificates take many forms but they share the same primary goal: to authenticate a website or server's identity. How this is accomplished will depend on the type of certificate and the level of authentication or protection needed. The ...

That was then, this is now….Modernizing AppSec in Fast-Paced Development Environments

You are the weakest link. Hello.    Ninety-one percent of organizations experienced at least one software supply chain security incident in 2023. Chances are the other 9% are riding their luck: The average organization has nine high, critical ...

Ubuntu Addresses Multiple OpenJDK 8 Vulnerabilities

Several vulnerabilities have recently been identified in OpenJDK 8, which could potentially lead to denial of service, information disclosure, arbitrary code execution, or even the bypassing of Java sandbox restrictions. In response, Canonical ...

NEWS ANALYSIS Q&A: The early going of Generative AI and LLMs impacting cybersecurity

The art of detecting subtle anomalies, predicting emergent vulnerabilities and remediating novel cyber-attacks is becoming more refined, day by day. Related: GenAI’s impact on elections It turns out that the vast datasets churned out by ...

Exploring AI: Regulations and Threat Mitigation

Exploring AI: Regulations and Threat Mitigation josh.pearson@t… Tue, 08/20/2024 - 07:05 It’s something we’ve all heard repeatedly, but it’s a point worth hammering home: AI will shape the future of humanity. This fact is not lost on ...

GoGra Backdoor: Unnamed South Asian Media Outlet Targeted

As per recent reports, an unnamed media organization in South Asia had fallen prey to the GoGra backdoor in November 2023. The threat actor behind the South Asia media organization’s cyber attack is believed to be a part of Harvester, a ...

How to Patch your Linux Kernel before it gets exploited?

Linux Kernel server patch management is essential for ensuring the security, stability, and performance of your server infrastructure. This comprehensive guide covers everything you need to know, from the basics to advanced strategies for ...

Strategies for security leaders: Building a positive cybersecurity culture

Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the ...

AI for application security: Balancing automation with human oversight

In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s transforming threat detection and response. Wickert talks about integrating ...

Organizations turn to biometrics to counter deepfakes

The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations, according to iProov. ...

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Why a Savvy Security Strategy is Essential | Grip

Explore why having a savvy security strategy that includes comprehensive SaaS identity risk management is essential for any modern, SaaS-based enterprise. The post Why a Savvy Security Strategy is Essential | Grip appeared first on Security ...