Application Security News and Articles


Black Hat Fireside Chat: ‘Black Girls Hack’ emphasizes diversity as effective force multiplier

When Tennisha Martin, a veteran software quality assurance analyst, sought to move over to a security team a few years ago, the doors should have been wide open, given the much-ballyhooed cybersecurity skills shortage. Related: Modernizing ...

CMMC Compliance: Customer and Shared Responsibility Matrix

CMMC is a familiar framework to any contractor working as part of the defense industrial base and handling any form of controlled unclassified information. Whether it’s compliance in general, a specific clause relating to DFARS 252.204-7012 in ...

Akeyless Universal Secrets Connector: A Secrets Manager of Managers

Discover the power of External Secrets Manager with Akeyless. Simplify secrets management across multiple platforms and clouds, centralize control, enhance visibility, and ensure compliance. The post Akeyless Universal Secrets Connector: A ...

What’s in a Secret? Best Practices for Static, Rotated and Dynamic Secrets

Secrets are ranked as the leading cause of data breaches. Combat this by learning how to best use static, rotated, and dynamic secrets. The post What’s in a Secret? Best Practices for Static, Rotated and Dynamic Secrets appeared first on ...

USENIX Security ’23 – ARMore: Pushing Love Back Into Binaries

Authors/Presenters:Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating ...

Gartner’s 2024 Hype Cycle for Cyber-Risk Management Focuses More on Impact

Axio’s CRQ Included in Gartner’s 2024 Hype Cycle for Cyber-Risk Management Historically, Gartner’s Hype Cycle for Cyber Risk 2024 focused more on benchmarking and probability, but it has now increased Read More The post Gartner’s 2024 ...

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack Paths Death from Above: An Attack Path from Azure to Active Directory With BloodHound When we introduced Azure Attack Paths into BloodHound, they were added as a completely separate sub-graph. At no point did Active ...

Randall Munroe’s XKCD ‘Chili Tornado Quake’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chili Tornado Quake’ appeared first on Security Boulevard.

Emulating Sandworm’s Prestige Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Prestige ransomware since the beginning of its activities in October 2022. Prestige has been observed targeting organizations in the transportation and related ...

Prisoner Swap: Huge Russian Hackers Freed — Seleznev and Klyushin

Pragmatic politics: Anger as Putin gets back two notorious cybercriminals The post Prisoner Swap: Huge Russian Hackers Freed — Seleznev and Klyushin appeared first on Security Boulevard.

Network Vulnerability Scan: Detailed Overview

A network vulnerability scan checks and evaluates security vulnerabilities in a computer network. It uses special software to look at systems, devices, and apps in a network to find possible vulnerabilities. These might include outdated software ...

USENIX Security ’23 – SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution

Authors/Presenters:Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

Opal Security Extends Scope and Reach of Platform for Managing Privileges

Opal Security this week updated its privilege posture management platform to provide the ability to detect irregular access to an IT environment and manage privileges by groups. The post Opal Security Extends Scope and Reach of Platform for ...

News alert: Security Risk Advisors launchs VECTR Enterprise Edition for ‘purple team’ benchmarking

Philadelphia, PA, Aug. 1, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and ...

Achieving PCI DSS 4.0 Compliance with API Security

When it comes to financial services, retail, or any other industry that handles credit card information, Application Programming Interfaces (APIs) play a pivotal role in connecting systems, enabling seamless transactions, and facilitating ...

Cybersecurity Insights with Contrast CISO David Lindner | 8/2/24

Insight #1 Per IBM, the average cost of a data ...

Iranian Internet Attacked by Israeli Hacktivist Group: Reports

Israeli hacktivist group WeRedEvils reportedly attacked Iran's Wi-Fi infrastructure, knocking out internet service in parts of the country amid growing tensions following Israel's assassination this week of a Hamas leader in Iran. The post ...

Toil Not: Automate DevOps Governance

By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) In this show, Deb interviews two innovative technologists driving the DevOps Automated Governance ...

DevSecOps Security Toolchain Integration Guide

OverviewContinue reading on DevOps.dev »

Securonix unveils Cyber Data Fabric and Noise Canceling SIEM in EON suite

Securonix unveiled two new capabilities within the Securonix EON suite of AI-Reinforced capabilities: Cyber Data Fabric and Noise Canceling SIEM. These innovations bolster the Unified Defense SIEM solution empowering CyberOps teams to better ...