Application Security News and Articles


How to Align Infosec to Business Operations: Sam Curry’s Cybersecurity Playbook for Executives

This cybersecurity playbook is inspired by Sam Curry’s insights on the crucial role of building relationships in cybersecurity to affect change in information security and the business.  He recently shared his recommendations on cyberOXtales ...

The Hidden Cost of Click Fraud: Why Data You Can Trust, Matters

Click fraud artificially inflates the number of ad clicks, skewing campaign results. Skewed results can blind you to the areas that need improvement, focusing ad spend on fake engagement. The post The Hidden Cost of Click Fraud: Why Data You Can ...

ReliaQuest: Watch Out for Info-Stealers and RATs

ReliaQuest ranked LummaC2 and SocGholish among the top malware seen in Q2 and rounded out the top five list with AsyncRat, Oyster, and the growing numbers of info-stealers that were built using the Rust programming language. The post ReliaQuest: ...

Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations

Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations josh.pearson@t… Thu, 08/15/2024 - 17:28 As many organizations begin to embark on their journey toward Post-Quantum Cryptography (PQC) resilience, Thales can ...

The Polar Bear in Your Kitchen: A Cybersecurity Analogy

Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Control = Threat Detection & Response Imagine for a moment that your home has a rodent problem. To address this, you install a fancy system designed to automatically ...

Randall Munroe’s XKCD ‘Celestial Event’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Celestial Event’ appeared first on Security Boulevard.

Coming Soon: NEW Classroom Manager by ManagedMethods

Classroom Manager is purpose-built for K-12 cybersecurity, safety, and compliance At ManagedMethods, we pride ourselves on developing products that make cybersecurity, safety, and compliance easy and affordable for K-12 schools. And what has been ...

Microsoft’s August 2024 Patch Tuesday Addresses 10 Zero-Days, 6 Exploited

On Aug. 13, 2024, Microsoft released its latest batch of security updates as part of its Patch Tuesday program, addressing a total of 89 vulnerabilities across its products. Of particular concern this month are the 10 zero-day vulnerabilities ...

A Gap in the Armor: What Was Missing from Black Hat 2024

Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber security conference and others last week in Las Vegas.  There have been a lot of articles published on the main themes, focus, and top keywords of ...

Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION

KP♡TX PII: “General Motors has engaged in egregious business practices that violated Texans’ pri­vacy … in unthinkable ways,” rants state attorney general Ken Paxton (pictured). The post Don’t Mess With Texas Privacy: AG Sues GM ...

NIST Releases First Post-Quantum Encryption Algorithms

From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was CRYSTALS-KYBER, along ...

5 SecOps automation challenges — and how to overcome them

A confluence of factors is driving the need for greater automation of security operations centers (SOCs). Primary among them are the growing sophistication of threats, the sheer volume of security-related data, the speed of threat propagation, a ...

USENIX Security ’23 – Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations

Authors/Presenters:Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, and Ashfaq Ali Shafin, Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers ...

How to Maximize Network Security With AI and ML

There is an increased focus on how advances in artificial intelligence (AI) and machine learning (ML) can negatively impact network security. The post How to Maximize Network Security With AI and ML appeared first on Security Boulevard.

DEF CON Calls for Cybersecurity Volunteers to Defend Critical Infrastructure

DEF CON conference organizations are looking for volunteers to join a Franklin initiative to help secure critical infrastructure and school systems that lack the expertise required to defend themselves against cyberattacks. The post DEF CON Calls ...

Zero Compromise with Content Disarm and Reconstruction (CDR), Powered by Zscaler Browser Isolation and Votiro

The post Zero Compromise with Content Disarm and Reconstruction (CDR), Powered by Zscaler Browser Isolation and Votiro appeared first on Votiro. The post Zero Compromise with Content Disarm and Reconstruction (CDR), Powered by Zscaler Browser ...

Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts

Google cybersecurity researchers confirm that the Iranian-sponsored APT42 threat group is being ongoing phishing campaigns against President Biden, Vice President Harris, and ex-President Trump in an attempt to influence the upcoming presidential ...

Balbix Recognized in Three 2024 Gartner® Hype Cycle™ Reports

A couple of weeks ago, Balbix was recognized as a Representative Vendor in the newly created Exposure Assessment Platforms (EAPs) category in the Gartner® Hype Cycle™ reports for Security Operations and Managing Operational Technology, 2024. ...

TracFone Breach Underscores Critical Need for Mobile Carrier API Security

The recent Federal Communications Commission (FCC) settlement with TracFone Wireless, Inc. (TracFone) for $16 million highlights a critical vulnerability within the mobile telecommunications industry: API security. The investigation revealed ...