Application Security News and Articles


LockBit Ransomware: Two Russians Plead Guilty For Attacks

As per recent media reports, two Russian nationals have pleaded guilty in a United States (US) court for affiliate participation in the LockBit ransomware attacks. The two individuals part of the LockBit ransomware scheme have been identified as ...

Stay Safe Online: 5 Essential Tips for World Wide Web Day

Stay Safe Online: 5 Essential Tips for World Wide Web Day josh.pearson@t… Thu, 08/01/2024 - 07:00 World Wide Web Day is celebrated each year on the first of August, marking the day the Internet was first made available to the public in 1991. ...

Threat intelligence: A blessing and a curse?

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that security teams are blessed with an abundance of data and intelligence feeds to choose from. However, selecting the ...

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions. Jeswin shares his extensive experience in the ...

Why CISOs face greater personal liability

In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal liability risks for CISOs. These risks are driven by heightened cybersecurity threats, evolving ...

How to spot signs of ransomware in your school district

The FCC is running a new cybersecurity pilot program that will help eligible schools and libraries pay for a variety of cybersecurity investments. The post How to spot signs of ransomware in your school district appeared first on ManagedMethods ...

Practical strategies to mitigate risk and secure SAP environments

Large companies use ERP applications to manage business processes, including payroll and financial planning. This is precisely why bad actors are taking a renewed interest in these legacy systems – and succeeding. In this Help Net Security ...

Maritime Cybersecurity: Avoiding the Next DALI 

U.S. ports, shipping companies and critical pipelines have repeatedly sustained cyberattacks, with increasing severity and consequences. The post Maritime Cybersecurity: Avoiding the Next DALI  appeared first on Security Boulevard.

Airlines are flying blind on third-party risks

The aviation industry has traditionally focused on physical security threats, but recent revelations about risks on Boeing‘s supply chain have spotlighted the critical need to measure and mitigate supply chain risk, according to ...

Infosec products of the month: July 2024

Here’s a look at the most interesting products from the past month, featuring releases from: AttackIQ, AuditBoard, Black Kite, BlueVoyant, Druva, GitGuardian, Invicti Security, IT-Harvest, LogRhythm, LOKKER, NordVPN, Pentera, Permit.io, Prompt ...

Join the Fight: Calling Fintech Leaders to Unite With Federated Learning for Superior Fraud Detection

Federated learning enables better fraud detection while simultaneously guaranteeing data privacy and security, aligning with our common needs. The post Join the Fight: Calling Fintech Leaders to Unite With Federated Learning for Superior Fraud ...

Breaking News: Microsoft Azure Faces Service Disruption Amidst DDoS Attack

Microsoft acknowledged a service disruption that affected a range of its cloud services on July 30, 2024. The incident, which spanned from 11:45 UTC to 19:43 UTC, saw customers globally experiencing difficulties connecting to services such as ...

Evolving development with software composition analysis and software bills of materials

Software development is as dynamic as it is challenging, so understanding what goes into your applications is more crucial than ever. As usage of open source continues to grow, so does the complexity in ensuring software components are secure, ...

Understanding the Impact of the CrowdStrike Event

In the early hours of Friday, July 19th, airline flights were halted, hospitals couldn’t serve patients, and critical infrastructure was disrupted—all because of a security software update gone wrong. Systems Read More The post Understanding ...

New Jack Henry Banno Integration from Allure Security Strengthens Security Against Phishing and Online Impersonations

Allure Security recently collaborated with the Jack Henry to create a new integration for the Jack Henry Banno banking platform to increase financial institutions’ security against online brand impersonation, phishing, and account takeover ...

Taylor Swift Ticket Leak: A Potential Threat from the Recent TicketMaster Breach

A recent leak may have exposed sensitive information related to Taylor Swift’s concert tickets. This incident is directly connected to the data breach that occurred on TicketMaster a few weeks ago. A New Data Package Surfaces on the Dark Web ...

USENIX Security ’23 – Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

Authors/Presenters:Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

Microsoft: DDoS Attack on Azure Services Exacerbated by Defense Error

A DDoS attack cause outages of such Microsoft services as Azure, Microsoft 365, and Outlook, but an implementation error in the company's defenses made the situation worse, the IT giant said. The post Microsoft: DDoS Attack on Azure Services ...

Less is More…|more or |less

|less — In Detection Engineering and Threat Hunting, quality beats quantity every time. |more — If the title of this blog posts brings a smile to your face, chances are we have a lot in common. Back in my day, OS/2 Warp was ...

State of SaaS Security Report 2024: Key Findings & Tips from Deployments at Scale

Join us to confront confusion over responsibilities and risks, and discover bold strategies to secure SaaS. Empower your CISO, security team, and application owners with actionable insights. The post State of SaaS Security Report 2024: Key ...