Application Security News and Articles


Browser backdoors: Securing the new frontline of shadow IT

Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger ...

Key metrics for monitoring and improving ZTNA implementations

In this Help Net Security interview, Dean Hamilton, CTO at Wilson Perumal & Company, discusses the complexities of zero trust network access (ZTNA) implementation, focusing on balancing security with operational efficiency. Hamilton ...

How CIOs, CTOs, and CISOs view cyber risks differently

C-suite executives face a unique challenge: aligning their priorities between driving technological innovation and ensuring business resilience while managing ever-evolving cyber threats from criminals adept at exploiting the latest technologies, ...

35% of exposed API keys still active, posing major security risks

Nightfall AI’s research revealed that secrets like passwords and API keys were most often found in GitHub, with nearly 350 total secrets exposed per 100 employees every year. Hidden risks of secret sprawl in cloud and SaaS environments ...

Trail of Bits Advances to AIxCC Finals

Trail of Bits has qualified for the final round of DARPA’s AI Cyber Challenge (AIxCC)! Our Cyber Reasoning System, Buttercup, placed in the top 7 out of 39 teams competing in the semifinal round held at DEF CON 2024. Competition Overview The ...

Ransomware Attack Fetched A Record $75 Million

LAS VEGAS — Ransomware attacks are escalating in scale and frequency. But one recent payout, a record  $75 million by a victimized Fortune 50 company, trumped a surge in extortion attacks that are likely to only increase, according to a ...

9 Powerful Ways AI Can Enhance Cyber Risk Management Today

TL;DR: The recent Ponemon report, sponsored by Balbix, shows that organizations recognize that Artificial intelligence (AI) offers significant potential to address the cybersecurity skills gap through the automation of operational tasks, enabling ...

USENIX Security ’23 – Automated Security Analysis of Exposure Notification Systems

Authors/Presenters:Kevin Morio, Ilkan Esiyok, Dennis Jackson, Mozilla; Robert Künnemann Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

DOJ Shuts Down Another North Korean ‘Laptop Farm’

The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program and to steal information from unsuspecting companies in the United ...

CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz

IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8, allows threat actors to perform ...

Randall Munroe’s XKCD ‘Vice President First Names’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Vice President First Names’ appeared first on Security Boulevard.

Privacy Risks in Google’s New Play Store Personalization

Personolization is a double edged sword. On one hand, it enhances user experiences by offering tailored recommendations, but on the other hand, it raises significant privacy concerns. Google Play's recent announcement about introducing new ...

News alert: Criminal IP and Maltego team up to broaden threat intelligence data search

Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP, an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego, a global all-in-one investigation platform ...

AppViewX Automated Certificate Management for PingAccess

In today’s rapidly evolving digital landscape, ensuring the security of web applications is essential to ensure revenue growth and a positive business reputation. One critical aspect of this security is the management of SSL/TLS certificates. ...

USENIX Security ’23 – DISTDET: A Cost-Effective Distributed Cyber Threat Detection System

Authors/Presenters:Feng Dong, Liu Wang Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

HYAS Investigates Threat Actors Hidden In Gaming Services

Threat Intelligence Report Date: August 12, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Threat Actors Exploiting Legitimate Services to Disguise Traffic Recently, the HYAS Threat Intelligence team has noticed ...

How to Achieve POPIA Compliance: Complete Checklist

Get the essential checklist for POPIA compliance. Learn key requirements and steps to meet South Africa's data protection law. The post How to Achieve POPIA Compliance: Complete Checklist appeared first on Scytale. The post How to Achieve POPIA ...

Trump Campaign Hack Points to Growing U.S. Election Threats

The Trump campaign is claiming a hack is the work of Iranian operatives, adding to expanding election-interference campaigns that also include China and Russia, which the federal government calls the "predominant threat to U.S. elections." The ...

The Value in Root Cause Analysis for Vulnerability Management

Identifying and addressing underlying issues and their root causes can lead to risk reduction, cost savings and better overall performance of a vulnerability management program. The post The Value in Root Cause Analysis for Vulnerability ...

Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search

Torrance, United States / California, 12th August 2024, CyberNewsWire The post Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search appeared first on Security Boulevard.