Application Security News and Articles


The evolution of open source risk: Persistent challenges in software security

As organizations increasingly rely on open source software, associated security risks grow, demanding more robust and proactive risk management. The post The evolution of open source risk: Persistent challenges in software security appeared first ...

Cloud Security Alliance Advocates Zero Trust for Critical Infrastructure

The Cloud Security Alliance, noting the increasing cyberthreats to critical infrastructure in a highly interconnected world, released a report outlining steps organizations can take to implement zero trust policies to protect against nation-state ...

DEF CON 32 – AppSec Village – Maturing Your Application Security Program – SheHacksPurple

Authors/Presenters:Tanya Janca Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely []DEF CON 32]2 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Citrix Boosts Security for Remote Application Accesses With “More Security Layers”

Connections on the internet are not secure by default, and bad actors frequently take advantage of users accessing organizations’ applications and resources from remote locations, to burrow into corporate networks. Experts recommend picking a ...

AI in Banking: No Longer Just for the Big Banks

Tigran Safari, Client Success Manager AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements on this month’s Banking Podcast from The ...

Survey Surfaces Fundamental Weaknesses in API Security

Traceable AI today published a global survey of 1,548 IT and cybersecurity professionals that finds well over half (57%) work for organizations that have experienced a data breach incident involving application programming interfaces (APIs) in ...

News alert: Cybersecurity, AI priorities for 2025 highlighted at ATPC Cyber Forum in Atlanta

Atlanta, GA, Oct. 30, 2024, CyberNewswire — The American Transaction Processors Coalition (ATPC) Cyber Council will convene “The Tie that Binds: A 21st Century Cybersecurity Dialogue,” on October 31, 2024, at the Bank of America Financial ...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

Atlanta, Georgia, 30th October 2024, CyberNewsWire The post ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues appeared first on Security Boulevard.

Baby Reindeer—The dangers of real-life stalkers

Hollywood loves a good thriller—and so do many of us. From Fatal Attraction to You, stalking is a recurring theme that keeps viewers glued to their screens. One of the latest installments in this genre, Netflix’s Baby Reindeer, pulls no ...

Immuta Data Marketplace automates data access workflows

Immuta announced an expansion of its platform with the launch of a new Data Marketplace solution to power fast and safe internal data sharing. Fueling a data marketplace that is owned and managed by the customer, the Immuta Platform enables ...

DEF CON 32 – AppSec Village – Navigating The Cyber Security Labyrinth Choose Your Own Security Adventure

Authors/Presenters:Punkcoder Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Simson Garfinkel on Spooky Cryptographic Action at a Distance

Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When ...

XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis

XM Cyber launched its innovative Vulnerability Risk Management (VRM) solution, extending its Continuous Exposure Management Platform. This new approach to vulnerability management empowers organizations to see through the fog of false positives ...

Salt Security and Dazz: A Powerful Partnership for API Security

As organizations adopt more modern application strategies, APIs are increasingly important for enabling seamless communication and data exchange. However, this interconnectedness also introduces more significant security risks. APIs are gateways ...

Ransomware hits web hosting servers via vulnerable CyberPanel instances

A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on the servers running it with the PSAUX and other ransomware. The PSAUX ransom note (Source: LeakIX) The ...

BOFHound: AD CS Integration

TL;DR: BOFHound can now parse Active Directory Certificate Services (AD CS) objects, manually queried from LDAP, for review and attack path mapping within BloodHound Community Edition (BHCE). Background My last BOFHound-related post covered the ...

Neon Authorize: Granular access controls at the database layer

Neon, the serverless Postgres database built for developers, launched Neon Authorize. It enables developers to manage permissions and access controls with ease. This new offering leverages Postgres RLS (Row-Level Security) – a Postgres ...

Product showcase: Shift API security left with StackHawk

With the proliferation of APIs, and the speed at which AI functionality is helping fuel innovation, a strategic approach for securing APIs is no longer a nice to have, it’s a criticality. Without a proactive approach, your APIs could become ...

AI Cyberattacks Rise but Businesses Still Lack Insurance

Cybersecurity is a leading concern for risk managers as AI-related cyber risks surge, and despite growing investments, many businesses still lack comprehensive cyber insurance, according to a Nationwide survey. The post AI Cyberattacks Rise but ...

CHOROLOGY.ai Extends AI Reach to Classify Sensitive Data

CHOROLOGY.ai this week added an Automated Compliance Engine (ACE) to its data security posture management (DSPM) platform that makes use of multiple types of artificial intelligence (AI) to rapidly classify sensitive data at scale. The post ...