Application Security News and Articles


Democracy’s Challenge: Secure Elections Worldwide

LAS VEGAS — The U.S. presidential election is less than three months away, and many cybersecurity experts are bracing for a deluge of deceit. During a Black Hat 2024 keynote panel Wednesday morning, international leaders outlined how they ...

USENIX Security ’23 – Eos: Efficient Private Delegation of zkSNARK Provers

Authors/Presenters:Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

Recent El Salvador Cyber Attacks

El Salvador Cyber Attacks Pose Significant Threats Cybercriminals and hacking groups are increasingly exploiting geopolitical instability to launch attacks, like the recent El Salvador Cyber Attack, that create chaos and financial gain. Data ...

D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR

D3's Legacy SOAR Migration Program enables organizations to move from underperforming SOAR tools to D3’s Smart SOAR in record time. The post D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR appeared first on D3 ...

MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC

Reading Time: 2 min Discover how Quinset Consulting leveraged PowerDMARC to transform their business and client relationships. The post MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC ...

Student Devices Wiped — Mobile Guardian Hacked AGAIN

Hackers ate my homework: MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore alone. The post Student Devices Wiped — Mobile Guardian Hacked AGAIN appeared first on Security Boulevard.

Windows Downdate: Downgrade Attacks Using Windows Updates

A SafeBreach researcher took over the Windows Update process to make the term “fully patched” meaningless on any Windows machine in the world. The post Windows Downdate: Downgrade Attacks Using Windows Updates appeared first on ...

Botnet 7777: Are You Betting on a Compromised Router?

Firstly, we extend our thanks to Chris Fearnley and Gi7w0rm, two threat researchers who assisted us behind the scenes with our... The post Botnet 7777: Are You Betting on a Compromised Router? appeared first on Security Boulevard.

How Sonar Helps Meeting NIST SSDF Code Security Requirements

Sonar’s solutions, including SonarLint, SonarQube, and SonarCloud, help you meet NIST SSDF code security requirements and enhance overall code quality. Find out how. The post How Sonar Helps Meeting NIST SSDF Code Security Requirements appeared ...

Randall Munroe’s XKCD ‘Matter’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Matter’ appeared first on Security Boulevard.

Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level

Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabilities in an IT environment that should be remediated first based on the actual threat they represent. The post Tenable Adds Ability to Prioritize ...

How Escape’s agentless API discovery technology works

Discover what makes Escape's agentless API discovery technology truly innovative. The post How Escape’s agentless API discovery technology works appeared first on Security Boulevard.

Why Governments Worldwide Recommend Protective DNS

HYAS Protect protective DNS uses advanced data analytics to proactively block cyber threats, a feature unavailable in legacy systems relying on static DNS filtering. AV-TEST, one of the cybersecurity industry’s most trusted evaluators, rates ...

How Fairwinds Delivers On EKS Internally, AWS EKS Delivery Designation

The Amazon Web Services (AWS) Service Delivery designation is a specialized program designed to validate AWS Partners that have experience, deep technical expertise, and proven success delivering specific AWS services for clients. In October ...

USENIX Security ’23 – Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree

Authors/Presenters:Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these attacks. The post This Caller Does Not Exist: Using AI ...

Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches

Sysdig today extended the reach of the cloud detection and response platform by adding the ability to correlate identity behavior with workload activity and cloud resources. Maya Levine, a product manager for Sysdig, said Cloud Identity Insights ...

Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability

Rubrik at the Black Hat USA 2024 conference today revealed it is partnering with the Mandiant arm of Google to reduce the amount of time organizations require to recover from a cybersecurity breach. The post Rubrik Allies With Mandiant to ...

CrowdStrike engages external experts, details causes of massive outage

CrowdStrike has published a technical root cause analysis of what went wrong when a content update pushed to its Falcon sensors borked over 8.5 million Windows machines around the world on July 19, and has confirmed that it has hired two unnamed ...

How to Choose the Best Data Masking Software Based on Gartner Peer Insights

Choosing the right data masking software can be overwhelming with so many options available. Gartner Peer Insights lists over 20 vendors in the data masking category alone, and making sense of these reviews to make an informed decision can be ...