Application Security News and Articles


Beyond the Noise: Achieving Accurate API Inventory with AI

The prevalence of APIs in today's digital environment is undeniable. They are crucial for modern applications, enabling seamless communication and data exchange between different software components. The rise of AI and machine learning has ...

RL Spectra Advanced File Analysis and Malware Detection Suite Updates

ReversingLabs is proud to announce new features for Spectra Analyze (formerly A1000) and Spectra Detect (formerly Titanium Scale). Our goal at ReversingLabs is to consistently improve the quality and efficiency of our platform to exceed the needs ...

How to Inspect TLS Encrypted Traffic

Do you want to analyze decrypted TLS traffic in Wireshark or let an IDS, like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic? There are many different TLS inspection solutions to choose ...

Hunters International RaaS Group Points SharpRhino at IT Workers

Hunters International, a fast-rising RaaS group, is using a typosquatting domain for the open source Angry IP Scanner tool to deliver a novel RAT malware called SharpRhino in a campaign targeting IT workers. The post Hunters International RaaS ...

Executives Beware: Understanding the Risk of Targeted Cyberattacks

Cybersecurity is no longer just an IT concern. It’s a critical business issue that demands attention from the highest levels of leadership. As the pioneers of digital executive protection, BlackCloak provides online privacy protection, home ...

Why Legit Security Immediately Joined the New Coalition for Secure Artificial Intelligence (CoSAI)

Get details on CoSAI and why Legit chose to be a part of this forum. The post Why Legit Security Immediately Joined the New Coalition for Secure Artificial Intelligence (CoSAI) appeared first on Security Boulevard.

Veza introduces Access AI to streamline risk management and access control

Veza has released Access AI, a generative AI-powered solution to maintain the principle of least privilege at enterprise scale. With Access AI, security and identity teams can now use an AI-powered chat-like interface to understand who can take ...

Critical Docker Engine Flaw Enables Authorization Plugin Bypass

A critical vulnerability was identified in certain versions of Docker Engine that allows attackers to bypass authorization plugins (AuthZ) under specific circumstances. Docker has recently released security updates to address this vulnerability. ...

Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)

Two cross-site scripting vulnerabilities (CVE-2024-42009, CVE-2024-42008) affecting Roundcube could be exploited by attackers to steal users’ emails and contacts, email password, and send emails from their account. About the vulnerabilities ...

AppSOC launches new AI security capabilities for enhanced governance and protection

AppSOC has launched capabilities for safeguarding artificial intelligence (AI) applications and agents while providing the visibility and governance that enterprises need to leverage AI with confidence. Businesses across sectors are recognizing ...

Cequence Unified API Protection defends against attacks targeting AI applications

Cequence introduced advancements to its Unified API Protection (UAP) platform, specifically tailored to support the secure use of AI applications like Generative AI and Large Language Models (LLMs). Cequence’s solutions protect applications ...

Elastic automates SIEM data onboarding with Automatic Import

Elastic is accelerating the adoption of AI-driven security analytics by automating SIEM data onboarding with Automatic Import. This new feature — the only one of its kind for a security analytics or SIEM solution — automates the development ...

D3 enhances Smart SOAR Platform with Ace AI

D3 has announced the release of Ace AI, a collection of new capabilities for D3’s Smart SOAR platform that leverage the power of artificial intelligence to make security operations faster and more intuitive. In a security operations climate ...

Flashpoint Ignite and Echosec deliver threat intelligence for enhanced protection

Flashpoint has released new features and capabilities to its flagship platform, Flashpoint Ignite, and Echosec, its comprehensive location intelligence solution. Those working in security and threat analysis are at the forefront of the constantly ...

Contrast Security ADR enables teams to identify vulnerabilities, detect threats, and stop attacks

Contrast Security introduced Application Detection and Response (ADR), which empowers security teams to identify vulnerabilities, detect threats, and stop attacks that target custom applications and APIs. Today’s layered “detection and ...

Cymulate AI Copilot validates security against real-time threats

Cymulate AI Copilot is a generative AI solution designed to deploy, test and tune security controls to evaluate their effectiveness against real-time threats. The solution offers a dynamic attack planner, among other AI-powered features, for ...

OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware

Forescout has published a new report examining the current state of the software supply chain in OT/IoT routers. The study uncovered that OT and IoT cellular routers and those used in small offices and homes contain outdated software components ...

The C-Suite Conundrum: Are Senior Executives the Achilles’ Heel of Cybersecurity?

C-level executives have insights, access and control over privileged company data, systems and finances. Such information and access are highly coveted by cybercriminals, due to their potential for exploitation and illicit gain. The post The ...

Sports venues must vet their vendors to maintain security

Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ...

RustScan: Open-source port scanner

RustScan is an open-source port scanner designed for speed and versatility. It combines a sleek interface with the power to adapt and improve over time. With RustScan’s Adaptive Learning, the tool continually optimizes its performance, ...