Application Security News and Articles


Join the Fight: Calling Fintech Leaders to Unite With Federated Learning for Superior Fraud Detection

Federated learning enables better fraud detection while simultaneously guaranteeing data privacy and security, aligning with our common needs. The post Join the Fight: Calling Fintech Leaders to Unite With Federated Learning for Superior Fraud ...

Breaking News: Microsoft Azure Faces Service Disruption Amidst DDoS Attack

Microsoft acknowledged a service disruption that affected a range of its cloud services on July 30, 2024. The incident, which spanned from 11:45 UTC to 19:43 UTC, saw customers globally experiencing difficulties connecting to services such as ...

Evolving development with software composition analysis and software bills of materials

Software development is as dynamic as it is challenging, so understanding what goes into your applications is more crucial than ever. As usage of open source continues to grow, so does the complexity in ensuring software components are secure, ...

Understanding the Impact of the CrowdStrike Event

In the early hours of Friday, July 19th, airline flights were halted, hospitals couldn’t serve patients, and critical infrastructure was disrupted—all because of a security software update gone wrong. Systems Read More The post Understanding ...

New Jack Henry Banno Integration from Allure Security Strengthens Security Against Phishing and Online Impersonations

Allure Security recently collaborated with the Jack Henry to create a new integration for the Jack Henry Banno banking platform to increase financial institutions’ security against online brand impersonation, phishing, and account takeover ...

Taylor Swift Ticket Leak: A Potential Threat from the Recent TicketMaster Breach

A recent leak may have exposed sensitive information related to Taylor Swift’s concert tickets. This incident is directly connected to the data breach that occurred on TicketMaster a few weeks ago. A New Data Package Surfaces on the Dark Web ...

USENIX Security ’23 – Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M

Authors/Presenters:Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

Microsoft: DDoS Attack on Azure Services Exacerbated by Defense Error

A DDoS attack cause outages of such Microsoft services as Azure, Microsoft 365, and Outlook, but an implementation error in the company's defenses made the situation worse, the IT giant said. The post Microsoft: DDoS Attack on Azure Services ...

Less is More…|more or |less

|less — In Detection Engineering and Threat Hunting, quality beats quantity every time. |more — If the title of this blog posts brings a smile to your face, chances are we have a lot in common. Back in my day, OS/2 Warp was ...

State of SaaS Security Report 2024: Key Findings & Tips from Deployments at Scale

Join us to confront confusion over responsibilities and risks, and discover bold strategies to secure SaaS. Empower your CISO, security team, and application owners with actionable insights. The post State of SaaS Security Report 2024: Key ...

TrustCloud Product Updates: July 2024

TrustShare Improvements to the Chrome extension. Our Chrome extension is getting some big updates in August: The extension will move to its own sidebar, so it won’t obstruct any portion of the window you’re working in Once you’re logged in ...

Emulating the Politically Motivated North Korean Adversary Andariel – Part 2

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the North Korean state-sponsored adversary Andariel during Operation Blacksmith which affected manufacturing, agricultural and physical security companies in ...

The big cybersecurity themes at Black Hat 2024 — and why they matter

As tens of thousands of cybersecurity professionals, executives and policymakers converge on the Las Vegas strip for “Hacker Summer Camp”— the annual Black Hat, DEF CON and B-Sides conferences — the stakes couldn’t be higher. After all, ...

The Skewed Perception of Security: A Dangerous Mindset

Recently, a survey was released that examined how different organizations perceive data security. One question, in particular, yielded surprising yet unsurprising results: a large majority of respondents expressed confidence in the effectiveness ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #300 – The Conference Dictionary

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Report: Amount of Data Being Analyzed by Cybersecurity Teams Rises

An analysis published today by Cribl, a data management platform provider, suggests that the amount of data being processed and analyzed by cybersecurity teams is increasing exponentially. The post Report: Amount of Data Being Analyzed by ...

CrowdStrike Sued? — Delta Dials David Boies

Is Delta the First of Many? Airline calls in attorneys Boies Schiller Flexner to claw back its cash. The post CrowdStrike Sued? — Delta Dials David Boies appeared first on Security Boulevard.

Navigating the Evolving Landscape of Cybersecurity

A Focus on Vulnerability Management In recent years, the cybersecurity landscape has undergone significant transformations, particularly... The post Navigating the Evolving Landscape of Cybersecurity appeared first on Security Boulevard.

Black Hat Preview: CrowdStrike, Disinformation Lead The Narrative

The stakes have rarely been higher. As cybersecurity experts make their way to the one-armed bandits and scorching heat in Las Vegas for Black Hat USA 2024 next week, the specter of the CrowdStrike Inc. debacle looms large. More than a dozen ...

USENIX Security ’23 – Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild

Authors/Presenters:Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...