Application Security News and Articles


Key Takeaways from the Cyber Security Summit in Minnesota: AI, Data Security and MSSP Differentiation

The 14th Annual Cyber Security Summit in Minneapolis proved invaluable, gathering experts from government, law enforcement and various industries to discuss the future of cybersecurity under this year’s theme, All In for Next. Over three days, ...

Lateral Movement in Recent Cybersecurity Breaches

Highlighting two recent cybersecurity breaches to study lateral movement Lateral movement is significant threat to all organization, from small startups to large multinational corporations. This tactic allows cybercriminals to move through a ...

CVE-2024-9680 – Mozilla Firefox Security Vulnerability – October 2024

A critical vulnerability (CVE-2024-9680) in Mozilla Firefox exposes systems to remote code execution by exploiting memory handling flaws.  Affected Platform  CVE-2024-9680 affects Mozilla Firefox users on multiple operating systems, including ...

Doomed Keys and Hidden Threats: The Scariest Secrets in Your Repositories

At GitGuardian we see things that no one should ever see. We detect and collect leaked secrets that are so hideous we could lose our sanity. Let us introduce you to some of the most terrifying leaks we saw this year. If you dare. The post Doomed ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #311 – Come to the Office

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

How SSO and MFA Improves Identity Access Management (IAM)

Single Sign-On (SSO) and Multi-Factor Authentication (MFA) - two key solutions that can both streamline access to critical systems and data for more geographically dispersed users, while minimizing the risk of unauthorized entry.  The post How ...

Shedding AI Light on Bank Wire Transfer Fraud

Wire transfer fraud occurs when scammers convince a company to send money to a fraudulent account. While weeding out suspicious requests like this may seem rudimentary, it’s not. The post Shedding AI Light on Bank Wire Transfer Fraud appeared ...

Terrifying Trends in the 2024 Cyber Threat Landscape

The 2024 cyber threat landscape highlights the growing sophistication of bots, with anti-detect browsers and automated attacks enhanced by the emergence of AI tools. The post Terrifying Trends in the 2024 Cyber Threat Landscape appeared first on ...

Safeguarding Cyber Insurance Policies With Security Awareness Training

With cybersecurity threats continuing to evolve at an accelerated pace, organizations need to ensure that their cyber insurance policies remain active at all times. The post Safeguarding Cyber Insurance Policies With Security Awareness Training ...

Roger Grimes on Prioritizing Cybersecurity Advice

This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists of threats, and so on, that are not ranked for ...

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was just starting my investigation into root cause analysis. ...

The AI Paradox in Digital Identity: Why More Security Might Mean Less Privacy (And What to Do About It)

The AI revolution in digital identity brings unprecedented security but at what cost? As AI systems become more sophisticated in protecting our digital lives, they require increasingly intimate access to our personal data, creating a critical ...

Small Businesses Boosting Cybersecurity as Threats Grow: ITRC

A report by the Identity Theft Resource Center found that while the number of small businesses hit by a cyberattack and the amount of losses continues to grow, companies are adopting stronger security best practices and investing more in security ...

DEF CON 32 – AppSec Village – Gridlock The Dual Edged Sword of EV and Solar APIs in Grid Security

Authors/Presenters:Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

SmokeBuster: Keeping Systems SmokeLoader Free

IntroductionIn May 2024, international law enforcement agencies, in collaboration with private industry partners (including Zscaler ThreatLabz), conducted Operation Endgame, disrupting many prominent malware loaders including Smoke (a.k.a. ...

Sophos mounted counter-offensive operation to foil Chinese attackers

Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. Espionage campaigns tied to Chinese ...

CJIS v5.9.5

What is CJIS (v5.9.5)? The Criminal Justice Information Services (CJIS) Security Policy v5.9.5 is a comprehensive security framework established by the Federal Bureau of Investigation (FBI). It sets standards for safeguarding and managing ...

Defending Democracy From Cyber Attacks in 2024

Cyberattacks during the 2016 U.S. presidential election exposed vulnerabilities in voter databases across 21 states, marking a stark warning about the fragility of our electoral systems. The post Defending Democracy From Cyber Attacks in 2024 ...

Cequence Achieves Prestigious AWS Retail Competency Status

Today’s businesses are increasingly cloud-forward and becoming more agile than ever, and the retail vertical in particular has embraced this digital transformation. Amazon Web Services (AWS) and Cequence have partnered to offer a unique set of ...

Google on scaling differential privacy across nearly three billion devices

In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential privacy technology across large systems. He emphasizes the need to develop ...