Application Security News and Articles


IntelOwl: Open-source threat intelligence management

IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I ...

Cybersecurity jobs available right now: August 14, 2024

Cloud Security Specialist EPAM Systems | Chile | Remote – View job details As a Cloud Security Specialist, you will be responsible for creating and maintaining security policies and assisting in the implementation and automation ...

Current attacks, targets, and other threat landscape trends

In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. ...

NIST releases finalized post-quantum encryption standards

NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) ...

Transform Your MSP’s Financial Future

Learn How Kaseya is Changing the Game for MSPs The post Transform Your MSP’s Financial Future appeared first on Kaseya. The post Transform Your MSP’s Financial Future appeared first on Security Boulevard.

Patch Tuesday Update – August 2024

The post Patch Tuesday Update - August 2024 appeared first on Digital Defense. The post Patch Tuesday Update – August 2024 appeared first on Security Boulevard.

Microsoft fixes 6 zero-days under active attack

August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days, and four are publicly known. The zero-days under attack CVE-2024-38178 is a Scripting Engine ...

FBI Disrupts Operations of the Dispossessor Ransomware Group

The FBI and law enforcement agencies from the UK and Germany seized servers and domains belonging to the Dispossessor ransomware gang, which had emerged into the spotlight following a similar operation against the notorious LockBit gang in ...

USENIX Security ’23 – One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat

Authors/Presenters:Chao Wang, Yue Zhang, Zhiqiang Lin Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

SBOMs Critical to Software Supply Chain Security

By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube)LAS VEGAS – One day before the Black Hat Briefings started in Vegas last week, a group of ...

Gartner® Insights: Navigating the Evolving API Protection Market and Taking Action

Securing your API ecosystem is increasingly complex, leaving organizations unsure where to begin. Gartner's®  2024 Market Guide for API Protection offers clear guidance: "Start using API protection products to discover and categorize your ...

WTH? DPRK WFH Ransomware Redux: 3rd Person Charged

North Korean army of remote IT workers enabled by Matthew Isaac Knoot, alleges DoJ. The post WTH? DPRK WFH Ransomware Redux: 3rd Person Charged appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Meteor Shower PSA’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Meteor Shower PSA’ appeared first on Security Boulevard.

Biden-Harris Campaign, Trump Operative Stone Also Target of Hackers

Hackers, possibly from Iran, sent phishing emails to the Biden-Harris campaign and Trump operative Roger Stone hoping to gain access into the systems of both presidential campaigns. It worked with Stone, who compromised email account opened the ...

4 Executive Travel Vulnerabilities You May be Overlooking

Learn how to minimize the impact of vulnerabilities like social media use, private jet tracking, and more As an executive protection (EP) professional, you’re likely experiencing a rise in physical threats against your principal(s). You’re ...

The Post-Quantum Cryptography Algorithms are finalized! Now what?

The Post-Quantum Cryptography Algorithms are finalized! Now what? josh.pearson@t… Tue, 08/13/2024 - 16:11 With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ...

North Korean Hackers Exploit VPN Update Flaw to Deploy Malware

South Korea’s national security and intelligence agencies have recently issued a joint cybersecurity advisory highlighting a significant cyber threat. State-backed hackers from the Democratic People’s Republic of Korea (DPRK) have exploited ...

Firmware Guide for Pen Testers

Contributions from Mathew Mullins, Supply Chain Security Consultant here at Eclypsium. Introduction Penetration tests come in many different varieties with the scope varying from all-inclusive to highly specific. When the penetration testing ...

NIST Announces the First 3 Post-Quantum Cryptography Standards – Ready or Not?

The Wait is Over. It’s Ready, Set, Go for PQC Migration! After 8 long years of rigorous research and relentless effort, the U.S. National Institute of Standards and Technology (NIST) has released the first set of finalized post-quantum ...

USENIX Security ’23 – Formal Analysis of SPDM: Security Protocol and Data Model Version 1.2

Authors/Presenters:Cas Cremers, Alexander Dax, Aurora Naska Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...