Application Security News and Articles
The January ransomware attack on loanDepot has so far cost the mortgage lender $26.9 million, including $25 million toward the possible settlement of a related class action lawsuit, company executives said in their Q2 financial report.
The post ...
Kubernetes v1.31 brings about some noteworthy improvements to the popular container orchestration platform that improve security and other
The post Kubernetes 1.31: a security perspective appeared first on ARMO.
The post Kubernetes 1.31: a ...
The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack surface ...
Cequence is excited to announce the latest release of our Unified API Protection (UAP) platform, version 7.3. This release has big new features and updates to existing capabilities, so let’s take a tour. The major feature categories include: ...
Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […]
The post How Hackers Steal Your RFID Cards appeared first on Security Boulevard.
Half of the 40,000 internet-connected industrial control systems (ICS) devices in the U.S., more than half of which are associated with building control and automation protocols, run low-level automation protocols found in wireless and consumer ...
Attackers looking for a way into organizations using Microsoft 365 can make an alert identifying unsolicited (and thus potential phishing) emails “disappear”. “When an Outlook user receives an e-mail from an address they don’t ...
The cybersecurity landscape is constantly evolving, with threats becoming increasingly sophisticated. Organizations are under immense pressure to protect their sensitive data and systems from cyberattacks. To address this challenge, many are ...
Menlo Security has unveiled enhancements to Menlo Zero Trust Access, the company’s zero trust solution, which keeps enterprises steps ahead of adversaries. Simultaneously, the Menlo team released new findings as a follow up to the team’s ...
A researcher has developed a downgrade attack that can make Windows machines covertly, persistently and irreversibly vulnerable, even if they were fully patched before that. A downgrade attack exploiting the Windows Update process The direction ...
We’re constantly improving our product for our customers. See the latest features, improvements, and fixes we have shipped over the past month.
The post Our Latest Product Updates appeared first on Security Boulevard.
Securonix and Cribl announced a strategic partnership focused on providing customers with enhanced threat detection, based on a broader range of enterprise data being analyzed for AI-powered attacks. Securonix recently announced Securonix EON ...
December 2023: The Initial Disruption Last December, insights from the Arkose Cyber Threat Intelligence Research (ACTIR) unit partnered with the Microsoft Digital Crimes Unit to disrupt the notorious cybercrime group, Storm-1152. A U.S. court ...
Endor Labs unveiled two capabilities, Upgrade Impact Analysis and Endor Magic Patches, that fix an expensive and time-consuming problem in the Software Composition Analysis (SCA) market. Software version upgrades are often required to fix ...
Several high-severity vulnerabilities have been discovered in BIND, potentially exposing millions of DNS servers to denial-of-service attacks. These issues have prompted urgent security updates from major Linux distributions such as Ubuntu and ...
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
The post Enhancing Enterprise Security with the Essential Eight and ...
When the zero day hits the fan, can you find the information you need?
The post Dude, Where’s My Documentation? appeared first on Security Boulevard.
ArmorCode has launched AI Remediation in its ArmorCode ASPM Platform to help resolve security issues faster, put security expertise in the hands of developers, and reduce DevSecOps friction. ArmorCode AI Remediation is a new capability and the ...
On July 29, a critical vulnerability in Acronis Cyber Infrastructure (ACI), tracked as CVE-2023-45249, was highlighted by CISA as being actively exploited by malicious actors. This
The post Exploitable Storage and Backup Vulnerabilities: A ...
AppViewX and Utimaco have partnered to offer cloud-delivered secure certificate and key lifecycle management solutions. Together, the companies will provide comprehensive, robust, and scalable platforms for certificate lifecycle management ...