Application Security News and Articles


Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Philadelphia, United States, 1st August 2024, CyberNewsWire The post Security Risk Advisors Announces Launch of VECTR Enterprise Edition appeared first on Security Boulevard.

Why zero trust is the new gold standard in cybersecurity

Why zero trust is the new gold standard in cybersecurity Why zero trust is the new gold standard in cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity The ever-changing digital ...

Fraud in the Travel Industry & How to Prevent It

Fraud in the travel industry can cost your business in direct losses, reputational damage, and negative customer experience. It’s more important than ever for businesses in the travel and hospitality industry to protect themselves and their ...

SENIX Security ’23 – Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs

Authors/Presenters:Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

Partnering With the National Child Protection Task Force

Empowering the Fight Against Child Exploitation As the CEO of HYAS, I am both honored and privileged to announce our partnership with the National Child Protection Task Force (NCPTF), a 501(c)(3) non-profit organization dedicated to assisting law ...

Google Using Enhanced Encryption to Protect Cookies

Google is adding greater encryption capabilities to Chrome to better protect users from information-stealing malware, a move that comes after the company's controversial decision to once again delay getting rid of third-party cookies. The post ...

Randall Munroe’s XKCD ‘Olympic Sports’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Olympic Sports’ appeared first on Security Boulevard.

Demystifying Github Cached Views – The Hidden Danger

Some explanations about the hidden danger of GitHub features that allow anyone to access commits you thought had been deleted. The post Demystifying Github Cached Views – The Hidden Danger appeared first on Security Boulevard.

Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. Leveraging several of these NTLM relay primitives, specifically ones that require ...

As Breach Costs Surge, Companies Need a Better Way to Find Shadow Data

Data breaches are on the rise. In the US, last year broke new records in terms of breach volumes. The bad news is that costs are also increasing. The latest IBM study reveals that they surged 10% annually to reach nearly $4.9m on average in 2024. ...

Why SAFE. Why Now.

It may feel like beating a dead horse to say it, but the threat of software supply chain attacks is increasing at an alarming rate. And, in fact, it can’t be said too often. Two recent reports illustrate this point: The "2024 Verizon Data ...

USENIX Security ’23 – SHELTER: Extending Arm CCA with Isolation in User Space

Authors/Presenters:Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations ...

The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic]

2 min read Journey with us through the identity cosmos, where understanding and safeguarding both humans and non-humans is mission-critical. The post The Enterprise Identity Universe: Users, Non-Humans, and Consumers [Infographic] appeared first ...

8 Essential Considerations for Post-Quantum Cryptography Migration

A primer on how to best prepare for the migration to PQC The United Nations has proclaimed 2025 the International Year of Quantum Science and Technology—and for good reason. Across the globe, the quantum community is making monumental strides ...

Strata Identity to Demonstrate How to Modernize Legacy Identity Systems to Microsoft Entra ID at Black Hat 2024

MEDIA ADVISORY Presenters at Microsoft Booth 1240 will also show how Strata’s Maverics  “Disconnected Mode” enables identity continuity and maintains uninterrupted access to apps when internet connectivity is unavailable BOULDER, Colo., ...

Attack Detection and Threat Hunting – Common Topics We’re Asked About

This article is the fifth in a series of five covering key API security topics and provides some answers to common questions we often get when talking to potential customers. The series will cover the following topics: API Discovery API Posture ...

The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach

The post The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach appeared first on Votiro. The post The Cyber Fallout: Navigating the Aftermath of a Credit Union Breach appeared first on Security Boulevard.

One Does Not Simply … Get a Cybersecurity Job

Where to Begin With thousands of unfilled positions reported year over year, why is it so hard to get a […] The post One Does Not Simply … Get a Cybersecurity Job appeared first on Security Boulevard.

Building Trustworthy AI: Contending with Data Poisoning

Nisos Building Trustworthy AI: Contending with Data Poisoning As Artificial Intelligence (AI) and Machine Learning (ML) systems are adopted and integrated globally, the threat of data poisoning attacks remains... The post Building Trustworthy AI: ...

Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization

Revolutionizing security testing with continuous security validation. The post Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization appeared first on AttackIQ. The post Democratizing Defense: AttackIQ Flex 2.0 Empowers Every ...