Application Security News and Articles


USENIX Security ’23 – The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Authors/Presenters:Willy R. Vasquez, Stephen Checkoway, Hovav Shacham Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

How Audit Procedures and Internal Controls Improve Your Compliance Posture

As businesses enhance their risk management techniques, the importance of efficient audit procedures and robust internal controls cannot be overstated. Audit procedures are used by audit teams to identify and assess risks. Auditors can also ...

SaaS Security 101 Workshop | Salesforce

Join us to tackle best practices and pitfalls of securing your Salesforce SaaS app. Designed for security practitioners with an office hours approach. The post SaaS Security 101 Workshop | Salesforce appeared first on AppOmni. The post SaaS ...

Top Trends in 2024 Reshaping the PKI Landscape

As we move through 2024, three events are causing significant disruption in the Public Key Infrastructure (PKI) landscape – the Entrust CA distrust incident, Google’s proposal for 90-day TLS certificate validity, and post-quantum cryptography ...

ClearSale introduces three solutions to protect businesses from fraud

ClearSale has announced a new portfolio of fraud prevention tools designed to meet the evolving needs of today’s digital retail landscape. The newly launched suite, dubbed “Preventative Intel,” introduces three powerful ...

DigiCert Acquires Vercara to Extend Cybersecurity Services

DigiCert today announced it is acquiring Vercara, a provider of Domain Name System (DNS) and distributed denial-of-service (DDoS) security services delivered via the cloud. The post DigiCert Acquires Vercara to Extend Cybersecurity Services ...

Time is of the Essence: Shrinking MTTR in API Security

In the fast-paced world of cybersecurity, every second counts. When an API attack occurs, the speed at which your security team can detect, understand, and respond to the threat can mean the difference between a minor incident and a major data ...

Strobes Integrates with Azure Repos: Enhancing Code Security

As software development reaches new heights, ensuring the security and management of your code is more crucial than ever. Seeing the need of the hour, Strobes CTEM is now integrated... The post Strobes Integrates with Azure Repos: Enhancing Code ...

NIST Releases Post Quantum Cryptography Standards

The National Institute of Standards and Technology (NIST) released its first three post-quantum cryptography (PQC) standards, a world-first designed to meet the threat of powerful quantum computers as well as the increasing encryption ...

Putting Threat Modeling Into Practice: A Guide for Business Leaders

By pushing past the hurdles that can make threat modeling challenging, business leaders can take full advantage of threat models to give their organizations a leg up in the battle against cyberattacks. The post Putting Threat Modeling Into ...

Update from the Ransomware Trenches

Authors: Rui Ataide, Hermes Bojaxhi GuidePoint’s DFIR team is frequently called upon to respond to Ransomware incidents. While many such […] The post Update from the Ransomware Trenches appeared first on Security Boulevard.

How LLMs are Revolutionizing Data Loss Prevention

As data protection laws take hold across the world and the consequences of data loss become more severe, let’s take a closer look at the transformative potential that LLMs bring to the table. The post How LLMs are Revolutionizing Data Loss ...

Scytale Leads the Way for the EU’s NIS2 Directive

Scytale supports the EU's NIS2 Directive, offering streamlined compliance and enhanced cybersecurity for European businesses. The post Scytale Leads the Way for the EU’s NIS2 Directive appeared first on Scytale. The post Scytale Leads the Way ...

Two Python Vulnerabilities Addressed in Ubuntu

Canonical has released critical security updates to address two vulnerabilities in Python, a popular programming language. These vulnerabilities pose significant risks to systems running Python, and it is crucial to apply the necessary updates to ...

Will GitOps Solve Configuration Security Issues? 

Rather than rely only on GitOps, teams should first implement AI and analytics capabilities to reduce human configuration security errors.  The post Will GitOps Solve Configuration Security Issues?  appeared first on Security Boulevard.

Ivanti Neurons for Patch Management enhancements automate patching process

Ivanti announced new features for Ivanti Neurons for Patch Management to help expand patch settings configuration to allow for multiple parallel deployment tasks such as regular maintenance, priority updates and zero-day response. Given the rise ...

7 Essential Steps for Conducting a Vulnerability Assessment

A vulnerability assessment is one of the most critical components of an organization’s vulnerability management strategy. You can’t fix security risks without knowing where you are exposed.  This assessment allows you to scan networks and ...

GraphQL Vulnerabilities and Common Attacks: Seen in the Wild

In our previous blog, we provided an overview of GraphQL security, along with details and examples of common attacks. Building on that foundation, this blog will take a closer look at real-world examples of GraphQL attacks that have recently ...

Chrome Protection: App-Bound Encryption For Cookies Added

Ensuring a safe browsing experience for its users, Google has announced that it’s adding a new app-bound encryption layer to Chrome. As per media reports, the added layer will help prevent information-stealing malware from grabbing cookies. In ...

Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?

In a potentially groundbreaking dispute, Delta Air Lines is threatening to sue CrowdStrike, a leading cybersecurity firm, for alleged negligence and breach of contract. This case brings to the forefront critical questions about the duties vendors ...