Application Security News and Articles


AWS’ Mithra Neural Network Detects, Ranks Malicious Domains

AWS details Mithra, its massive neural network graph model that runs on its internal systems and is used to identify and rank malicious domains that threaten the cloud giants systems that hold its customers' data. The post AWS’ Mithra Neural ...

Breaking down FCC’s proposal to strengthen BGP security

In this Help Net Security interview, Doug Madory, Director of Internet Analysis at Kentik, discusses the FCC’s proposal requiring major U.S. ISPs to implement RPKI Route Origin Validation (ROV), and addresses concerns about the impact on ...

Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise

Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face every few days, according to GitProtect.io. DevSecOps The possibility to ...

How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation

The post How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation appeared first on AI-enhanced Security Automation. The post How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation appeared first on Security Boulevard.

D3 to Introduce “Ace AI”, with AI-Generated Playbooks, at Black Hat USA 2024

Ace AI is a collection of new capabilities for D3’s Smart SOAR™ platform that leverages artificial intelligence to make SecOps faster & intuitive The post D3 to Introduce “Ace AI”, with AI-Generated Playbooks, at Black Hat USA 2024 ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations center (SOC) ...

Why Rule-Based Systems Fails to detect attacks and breaches?

In the realm of cybersecurity, brute force attacks are a persistent threat, exploiting the weaknesses of traditional rule- The post Why Rule-Based Systems Fails to detect attacks and breaches? appeared first on Seceon. The post Why Rule-Based ...

USENIX Security ’23 – Prime Match: A Privacy-Preserving Inventory Matching System

Authors/Presenters:Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso Many thanks to USENIX for publishing their outstanding USENIX Security ’23 ...

BloodHound Operator — Dog Whispering Reloaded

BloodHound Operator — Dog Whispering Reloaded It’s summer 2024 and we are back! Actually, we are SO back, so I decided that this required a little blog post. If you like BloodHound & PowerShell, and if you want to automate all the ...

How to Write a Secure update Method in Python

Managing class properties securely and efficiently is a crucial skill for any Python developer, especially when dealing with complex…Continue reading on Medium »

Joint Certification Program (DD 2345)

The post Joint Certification Program (DD 2345) appeared first on PreVeil. The post Joint Certification Program (DD 2345) appeared first on Security Boulevard.

Daniel Stori’s ‘The chroot Case’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘The chroot Case’ appeared first on Security Boulevard.

Breach Debrief Series: EchoSpoofing Phishing Campaign Exploiting Proofpoint’s Email Protection

In July, Guardio Labs reported they had detected “EchoSpoofing,” a critical in-the-wild exploit of Proofpoint’s email protection service. This sophisticated phishing campaign highlights the vulnerabilities of robust security systems and ...

Why API Security Testing Matters – Learning from Tracfone

Let's look at Tracfone's $16 million settlement with the FCC to understand why API security testing matters. The post Why API Security Testing Matters – Learning from Tracfone appeared first on Dana Epp's Blog. The post Why API Security Testing ...

DataDome Now Protects Keycloak IAM

Our new Keycloak integration is the latest in a range of 50+ integrations that ensure DataDome stops bad bots & fraud on any infrastructure. The post DataDome Now Protects Keycloak IAM appeared first on Security Boulevard.

The Prevalence of DarkComet in Dynamic DNS

Threat Intelligence Report Date: August 6, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Dynamic DNS (DDNS) is a service that automatically updates the Domain Name System (DNS) in real-time to reflect changes in ...

USENIX Security ’23 – FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

Authors/Presenters:Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

Understanding the Dark Web: A Hidden Realm

Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence. The post Understanding the Dark Web: A Hidden Realm appeared first on Security Boulevard.

Securing from Active Directory Attacks

Active Directory (AD) lies at the heart of your organization’s Windows network, silently orchestrating user access, authentication, and security. But do you truly understand its workings? This blog peels back... The post Securing from Active ...

Everything You Need to Know About the FFIEC

It’s no secret that the financial sector is one of the most highly regulated industries in the United States. Given the wide range of regulatory agencies that exist, who makes the rules? The Federal Financial Institutions Examination Council ...