Application Security News and Articles


Ransomware Attack Costs loanDepot Almost $27 Million

The January ransomware attack on loanDepot has so far cost the mortgage lender $26.9 million, including $25 million toward the possible settlement of a related class action lawsuit, company executives said in their Q2 financial report. The post ...

Kubernetes 1.31: a security perspective

Kubernetes v1.31 brings about some noteworthy improvements to the popular container orchestration platform that improve security and other The post Kubernetes 1.31: a security perspective appeared first on ARMO. The post Kubernetes 1.31: a ...

Operational Technology (OT) Security a Top Priority for CIOs

The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack surface ...

Advancing API Security and Bot Management with Cequence UAP v7.3

Cequence is excited to announce the latest release of our Unified API Protection (UAP) platform, version 7.3. This release has big new features and updates to existing capabilities, so let’s take a tour. The major feature categories include: ...

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] The post How Hackers Steal Your RFID Cards appeared first on Security Boulevard.

Web-Connected Industrial Control Systems Vulnerable to Attack

Half of the 40,000 internet-connected industrial control systems (ICS) devices in the U.S., more than half of which are associated with building control and automation protocols, run low-level automation protocols found in wireless and consumer ...

Microsoft 365 anti-phishing alert “erased” with one simple trick

Attackers looking for a way into organizations using Microsoft 365 can make an alert identifying unsolicited (and thus potential phishing) emails “disappear”. “When an Outlook user receives an e-mail from an address they don’t ...

AttackIQ’s New NIST CSF Assessment: A Game-Changer for Cybersecurity

The cybersecurity landscape is constantly evolving, with threats becoming increasingly sophisticated. Organizations are under immense pressure to protect their sensitive data and systems from cyberattacks. To address this challenge, many are ...

Menlo Zero Trust Access enhancements boost enterprise browsing security

Menlo Security has unveiled enhancements to Menlo Zero Trust Access, the company’s zero trust solution, which keeps enterprises steps ahead of adversaries. Simultaneously, the Menlo team released new findings as a follow up to the team’s ...

“Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days

A researcher has developed a downgrade attack that can make Windows machines covertly, persistently and irreversibly vulnerable, even if they were fully patched before that. A downgrade attack exploiting the Windows Update process The direction ...

Our Latest Product Updates

We’re constantly improving our product for our customers. See the latest features, improvements, and fixes we have shipped over the past month. The post Our Latest Product Updates appeared first on Security Boulevard.

Securonix and Cribl partner to enhance threat detection with advanced data integration

Securonix and Cribl announced a strategic partnership focused on providing customers with enhanced threat detection, based on a broader range of enterprise data being analyzed for AI-powered attacks. Securonix recently announced Securonix EON ...

Storm-1152: A Continuing Battle Against Cybercrime

December 2023: The Initial Disruption Last December, insights from the Arkose Cyber Threat Intelligence Research (ACTIR) unit partnered with the Microsoft Digital Crimes Unit to disrupt the notorious cybercrime group, Storm-1152. A U.S. court ...

Endor Labs launches Upgrade Impact Analysis and Magic Patches for SCA market

Endor Labs unveiled two capabilities, Upgrade Impact Analysis and Endor Magic Patches, that fix an expensive and time-consuming problem in the Software Composition Analysis (SCA) market. Software version upgrades are often required to fix ...

BIND Vulnerabilities: Urgent Security Updates Released

Several high-severity vulnerabilities have been discovered in BIND, potentially exposing millions of DNS servers to denial-of-service attacks. These issues have prompted urgent security updates from major Linux distributions such as Ubuntu and ...

Enhancing Enterprise Security with the Essential Eight and StorageGuard  

The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of The post Enhancing Enterprise Security with the Essential Eight and ...

Dude, Where’s My Documentation?

When the zero day hits the fan, can you find the information you need? The post Dude, Where’s My Documentation? appeared first on Security Boulevard.

AI Remediation by ArmorCode reduces DevSecOps friction and accelerates security fixes

ArmorCode has launched AI Remediation in its ArmorCode ASPM Platform to help resolve security issues faster, put security expertise in the hands of developers, and reduce DevSecOps friction. ArmorCode AI Remediation is a new capability and the ...

Exploitable Storage and Backup Vulnerabilities: A Growing Threat to Enterprise Security  

On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors.   This The post Exploitable Storage and Backup Vulnerabilities: A ...

AppViewX and Utimaco team up to enhance cloud security with new lifecycle management solutions

AppViewX and Utimaco have partnered to offer cloud-delivered secure certificate and key lifecycle management solutions. Together, the companies will provide comprehensive, robust, and scalable platforms for certificate lifecycle management ...