Application Security News and Articles


Fuzzing between the lines in popular barcode software

By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already been extensively ...

Strata Identity to Host a CSA CloudBytes Webinar on Achieving Zero Trust Identity with the Seven A’s of IAM

Session will present a comprehensive framework for managing identity to strengthen security, compliance, and application continuity BOULDER, Colo., Oct. 31, 2024—Strata Identity, the Identity Orchestration company, today announced it will host ...

Cybersecurity Awareness Month: AI vs. AI: Redefining Zero Trust

Author: Brian Deitch, Chief Technology Evangelist, Zscaler The rise of artificial intelligence isn’t just about automating some mundane processes or […] The post Cybersecurity Awareness Month: AI vs. AI: Redefining Zero Trust appeared first ...

Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety

The post Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety appeared first on Votiro. The post Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety appeared first on Security Boulevard.

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups

A supply chain compromise involving Lottie Player, a widely used web component for playing site and app animations, has made popular decentralized finance apps show pop-ups urging users to connect their wallets, TradingView has reported. The ...

Runtime context: the missing piece in Kubernetes security

Originally appeared on The New Stack. More and more organizations rely on Kubernetes to deploy and manage their applications. However, The post Runtime context: the missing piece in Kubernetes security appeared first on ARMO. The post Runtime ...

dope.security Embeds LLM in CASB to Improve Data Security

dope.security this week added a cloud access security broker (CASB) to its portfolio that identifies any externally shared file and leverages a large language model (LLM) to identify sensitive data. The post dope.security Embeds LLM in CASB to ...

NIST’s NICE: 3 ways to adapt the hiring framework for modern threats

The National Initiative for Cybersecurity Education's cybersecurity hiring framework may be a good place to start when putting together a solid security team. However, some changes are needed for NICE to equip teams with the knowledge, skills — ...

Securing APIs in Retail: Safeguarding Customer Data

The retail industry’s digital transformation has made secure APIs essential to modern operations since they are at the core of this shift. APIs power everything from e-commerce platforms and mobile shopping apps to inventory management, ...

Cynet enables 426% ROI in Forrester Total Economic Impact Study

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact Study ...

PowerDMARC Integrates with ConnectWise

PowerDMARC proudly announces its integration with ConnectWise. Check out the ConnectWise integration benefits for enhanced cybersecurity. The post PowerDMARC Integrates with ConnectWise appeared first on Security Boulevard.

North Korean hackers pave the way for Play ransomware

North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: ...

Lottie Player compromised in supply chain attack — all you need to know

Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a few hours. Understand what this threat means for your ...

Claro Enterprise Solutions helps organizations identify vulnerabilities within Microsoft 365

Claro Enterprise Solutions launched Collaboration Security Management solution. This comprehensive service addresses critical security challenges related to file sharing, data loss events, or unknown shadow users, faced by organizations using ...

Constella Intelligence Launches HunterTM Copilot AI Assistant for Dark Web Investigations

Automate criminal identity investigations and unmask threat actors with AI-powered link discovery for faster, deeper insights. Constella Intelligence today announced the launch of Hunter Copilot, a transformative new AI assistant feature within ...

IoT needs more respect for its consumers, creations, and itself

Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot vacuums from Chinese company, Ecovacs, can be compromised via a backdoor. In one case, hackers gained control over the ...

How agentic AI handles the speed and volume of modern threats

In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its application in cybersecurity. He explains how it differs from traditional automated security systems by offering greater autonomy and ...

Why cyber tools fail SOC teams

A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with ...

99% of CISOs work extra hours every week

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, according to DirectDefense. Cybersecurity industry faces ongoing talent ...

A Wave of Identity Security Reports Defines a Big Problem

There have been a wealth of reports lately articulating the poor state of identity risk.... The post A Wave of Identity Security Reports Defines a Big Problem appeared first on Axiad. The post A Wave of Identity Security Reports Defines a Big ...