Application Security News and Articles


I Have An SBOM, Now What ?!?

A Software Bill of Material (SBOM) lists the software components that are used in a piece of software. It typically also provides an overview of known vulnerabilities (N-day vulnerabilities) as well as the software licenses that cover the ...

Salt Security Continues to Innovate as Leader in API Security

The API security landscape is changing rapidly, and cybercriminals are becoming increasingly sophisticated. According to the Salt Labs State of API Security Report 2024, API security incidents have more than doubled in the past 12 months, while ...

Cyber Risk Landscape Peer Report: 4 action items for your organization

Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations against modern data breaches, a new report has found. The post Cyber Risk Landscape Peer Report: 4 action items for your organization appeared ...

5 Best Practices for Managing Endpoints On a Global Scale

Organizations that operate on a global scale must adopt some special practices to ensure not just that they can manage endpoints effectively, but also that they do so in ways that ensure a smooth experience for end-users. The post 5 Best ...

Hero AI by Swimlane enhances security with context-aware recommendations

Swimlane has introduced Hero AI innovations that transform traditional security operations, enabling security teams to tackle complex cases, alerts, and intelligence with unprecedented speed. Hero AI expands case summarization capabilities with ...

Researchers unearth MotW bypass technique used by threat actors for years

Threat actors have been abusing a bug in how Windows handles LNK files with non-standard target paths and internal structures to prevent in-built protections from stopping malicious payloads and trick users into running them. “We identified ...

Stellar Cyber launches Multi-Layer AI platform to enhance threat detection

Stellar Cyber is introducing Multi-Layer AI, incorporating four distinct technologies — machine learning (ML), graph ML, generative AI, and hyper automation — into a single unified platform that reduces threat detection and response time. ...

Unraveling the State of Kubernetes Security in 2024

We explored the Red Hat State of Kubernetes security report 2024, one of our favorite yearly reports. It’s The post Unraveling the State of Kubernetes Security in 2024 appeared first on ARMO. The post Unraveling the State of Kubernetes Security ...

SentinelOne unveils AI and cloud innovations on Singularity Platform

SentinelOne unveiled a series of new Purple AI, Cloud, Endpoint and Identity innovations to the company’s Singularity Platform. The new offerings and capabilities all leverage the industry’s most advanced generative AI technology, modern ...

APIs, Web Applications Under Siege as Attack Surface Expands

Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year growth in web attacks, driven by the increased adoption of these technologies, which significantly expanded organizational attack surfaces, according ...

Resecurity to introduce Context AI, a specialized generative AI framework

Resecurity (USA), a global leader in cybersecurity and risk management solutions serving major Fortune 500 companies and government agencies, has added new AI capabilities to its flagship Platform-as-a-Service (PaaS) offering, to accelerate its ...

How to Secure Your Organization from Shadow IT?

“Shadow IT” isn’t just a catchy term; it goes beyond official procedures. It also shows unmet employee tech needs and perceived problems in company processes. What’s worse is that shadow IT can make your system more vulnerable to attacks, ...

7 Data Security Systems & Products Driving Value

In 2022, it’s not enough for businesses to rely on antivirus products or malware protection alone. Cybercriminals have been spurred... The post 7 Data Security Systems & Products Driving Value appeared first on Symmetry Systems. The post 7 ...

ITSM concerns when integrating new AI services

Let’s talk about a couple of recent horror stories. Late last year, a Chevrolet dealership deployed a chatbot powered by a large language model (LLM) on their homepage. This LLM, trained with detailed specifications of Chevrolet vehicles, was ...

Scaling data security solutions: What you need to know

In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and ...

Email attacks skyrocket 293%

Email attacks have surged by 293% in the first half of 2024 compared to the same period in 2023, according to Acronis. The number of ransomware detections was also on the rise, increasing 32% from Q4 2023 to Q1 2024. Ransomware remains a top ...

AI-fueled phishing scams raise alarm ahead of U.S. presidential election

Highlighting growth of phishing and digital scams targeting United States citizens, Bolster released a research that identified 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to ...

Whitepaper: Tools to tackle the multicloud environment

Implementing multicloud solutions is becoming increasingly paramount for organizations seeking to drive their business forward in the coming years. As a result, the role of cloud security is evolving. Cloud providers often use different security ...

MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+

Eight-year-old domain hijacking technique still claiming victims The post MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+ appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post MSN: Russia takes ...

Human vs AI Agents in Cybersecurity: Who Should Guard Your Data?

n the battle against cyber threats, should we trust human experts or AI agents to protect our valuable data? Explore how AI's tireless vigilance, pattern recognition, and rapid adaptation are reshaping cybersecurity. The post Human vs AI Agents ...