Application Security News and Articles


AppOmni unveils SaaS-aware ITDR capabilities

AppOmni announced a series of technology advances to deliver identity and threat detection (ITDR) capabilities to protect SaaS environments. The newest capabilities complement traditional ITDR and identity and access management (IAM) solutions ...

TikTok Abuses Kids, say DoJ and FTC

For You Plague: U.S. Justice Dept. and Federal Trade Commission file lawsuit, alleging TikTok broke the COPPA law, plus a previous injunction. The post TikTok Abuses Kids, say DoJ and FTC appeared first on Security Boulevard.

Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring

LAS VEGAS — Humans, unsurprisingly, remain the weak link in cybersecurity. Related: Digital identity best practices We’re gullible – and we can’t get away from relying on usernames and passwords. Steady advances in software and hardware ...

National Public Data Sued for Hack that Exposed Data of 2.9 Billion People

National Public Data, a background check company that collects sensitive personal information, is facing a class-action legal complaint for allowing the data from 2.9 billion people to be stolen in a breach and later sold on the dark web for ...

USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning

Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail

Sonar’s R&D team discovered a Cross-Site Scripting vulnerability in Roundcube. Similar vulnerabilities in Roundcube have been used by APTs to steal government emails. The post Government Emails at Risk: Critical Cross-Site Scripting ...

USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning

Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

AI Policy and Governance: Shaping the Future of Artificial Intelligence

Learn why AI policy is vital for ethical development and how regulations like the EU AI Act shape the future. The post AI Policy and Governance: Shaping the Future of Artificial Intelligence appeared first on Scytale. The post AI Policy and ...

Novel SLUBStick Linux Exploit Gives Attackers Full System Control

A novel Linux kernel exploit technique called SLUBStick has proven to be 99% successful running the kind of attacks that in the past had a success rate of about 40% and allows bad actors to take total control of a system. The post Novel SLUBStick ...

Leveraging CRQ to Comply With DORA Regulations | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Leveraging CRQ to Comply With DORA Regulations | Kovrr appeared first on Security Boulevard.

Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)

CVE-2024-38856, an incorrect authorization vulnerability affecting all but the latest version of Apache OFBiz, may be exploited by remote, unauthenticated attackers to execute arbitrary code on vulnerable systems. About CVE-2024-38856 Apache ...

Salt Security Provides Free Scans for XXS Vulnerabilities Involving OAuth Protocol

Salt Security is making available a free scanning tool that it has been using to assess the level of potential risk organizations face from cross-site scripting (XSS) attacks in the wake of discovering similar flaws in multiple websites, ...

Cloud cryptography demystified: Google Cloud Platform

By Scott Arciszewski This post, the second in our series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Google Cloud Platform (GCP): when to use them, when not to use them, and important usage ...

Leveraging CRQ to Understand Ransomware Costs | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Leveraging CRQ to Understand Ransomware Costs | Kovrr appeared first on Security Boulevard.

Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) released

A partnership of 28 industry leaders serving public and private organizations across the vendor and consumer community volunteered their time, effort, and experience to launch the first version of the Cyber Threat Intelligence Capability Maturity ...

Rapid7 releases Command Platform, unified attack defense and response

Rapid7 launched its Command Platform, a unified threat exposure, detection, and response platform. It allows customers to integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to ...

7 features to look for in a PII Data Discovery Software: A guide for infosec and devops Professionals

When working in non-production environments such as testing and development, it’s crucial to ensure that Personally Identifiable Information (PII) is adequately protected. These environments often replicate production systems but may lack the ...

Chinese hackers compromised an ISP to deliver malicious software updates

APT StormBamboo compromised a undisclosed internet service provider (ISP) to poison DNS queries and thus deliver malware to target organizations, Volexity researchers have shared. Malware delivery via automatic software updates StormBamboo (aka ...

Azure Just-in-Time Access Simplified

In today’s rapidly evolving cloud landscape, organizations are grappling with the intricate challenge of striking a delicate balance between ensuring robust cybersecurity measures and facilitating seamless operational efficiency. As cloud ...

Multiple Tomcat Vulnerabilities Fixed in Ubuntu and Debian

Tomcat, a widely-used servlet and JSP engine, has recently undergone several security updates to address critical vulnerabilities. These vulnerabilities, if exploited, could lead to denial of service (DoS) attacks or arbitrary code execution, ...