Application Security News and Articles


How Kratikal’s GDPR Compliance Services Will Help Secure Businesses?

The internet’s widespread availability has changed the world. It has transformed how we talk to each other and get things done every day. We can now share files, pay bills, and shop by putting our personal details online. But do we know the ...

Tech support scammers impersonate Google via malicious search ads

Google Search ads that target users looking for Google’s own services lead them to spoofed sites and Microsoft and Apple tech support scams. The fake Google Search ads (Source: Malwarebytes) “In this particular scheme, all web ...

ESG Survey Report Finds AI, Secrets, and Misconfigurations Plague AppSec Teams

Find out how your peers are managing application security challenges.  The post ESG Survey Report Finds AI, Secrets, and Misconfigurations Plague AppSec Teams appeared first on Security Boulevard.

CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant... The post CVE-2024-38063: An ...

Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32

I recently spent six days in Las Vegas attending DEF CON, BsidesLV, and Black Hat USA 2024, where I had the opportunity to engage with and learn from some of the top security experts in the world. A major theme across all three conferences was ...

Pindrop Pulse Inspect analyzes and verifies whether media files contain synthetic speech

Pindrop launched Pindrop Pulse Inspect in Preview. This innovative tool, the latest addition to Pindrop’s deepfake detection Pindrop Pulse product family, can detect AI-generated speech in any digital audio file with 99% accuracy. Following ...

Holding Trust for Ransom: What’s at Stake as Business Trust Erodes 

Trust is vital to upholding the entire ecosystem in which all businesses operate, and the erosion of trust has considerable consequences for everyone.  The post Holding Trust for Ransom: What’s at Stake as Business Trust Erodes  appeared ...

Striking a Balance Between Business Growth, Risk Management and Cybersecurity

Some recommendations and best practices to help organizations strike a balance between business growth, risk management and cybersecurity. The post Striking a Balance Between Business Growth, Risk Management and Cybersecurity appeared first on ...

Critical Start helps organizations reduce cyber risk from vulnerabilities

Critical Start announced Critical Start Vulnerability Management Service (VMS) and Vulnerability Prioritization. These new offerings are a foundational pillar of Managed Cyber Risk Reduction, allowing organizations to assess, manage, prioritize, ...

Essential Linux Security Tools: A Comprehensive Overview for Security Professionals

Combining multiple Linux security tools to protect against various threats is crucial for a robust security posture. Effective use of security tools requires knowledge of their capabilities, configurations, and how to integrate them into a ...

Sitting Ducks Attack: Over 1M Domains At Risk Of Takeover!

In the world of cybercrime, over 1 million domains now face a risk of threat actor-initiated takeover as the Sitting Ducks attack comes to light. As per recent reports, the attack is conducted via an exploitation of a domain name system (DNS) ...

Elevate Your Risk Management Strategy with NSFOCUS CTEM

As cybersecurity, data protection, and personal information security regulations become increasingly stringent, regulatory bodies are taking robust measures to enhance oversight. However, organizations continue to face significant challenges in ...

Business and tech consolidation opens doors for cybercriminals

Cyber threats continued to intensify in the first half of 2024 as cybercriminals exploited security gaps from growing business and technological consolidation, according to Resilience. Consolidation in business and tech fuels new third-party ...

Input Validation and Sanitization: Protecting Your Application from Malicious Input

In today’s digital landscape, applications are constantly bombarded with user-supplied input. While most users have benign intentions, a…Continue reading on Medium »

Authentik: Open-source identity provider

Authentik is an open-source identity provider designed for maximum flexibility and adaptability. It easily integrates into existing environments and supports new protocols. It’s a comprehensive solution for implementing features like ...

How NoCode and LowCode free up resources for cybersecurity

In this Help Net Security video, Frederic Najman, Executive Member of the SFPN (French Union of NoCode Professionals), discusses how NoCode and LowCode technologies enable companies to free up development resources to tackle cybersecurity issues. ...

New infosec products of the week: August 16, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ClearSale, Guardio, Ivanti, Resecurity, and Stellar. Resecurity unveils new AI-driven Fraud Prevention Platform Resecurity unveiled its advanced ...

What’s Different About Data Security in the Cloud? Almost Everything.

In 2019, most organizations already had digital transformation plans in place. These plans included migrating workloads to modern cloud architectures. However, the Covid-19 pandemic compelled organizations to expedite their modernization efforts ...

USENIX Security ’23 – TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks

Authors/Presenters:Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...