Application Security News and Articles


Microsoft: DDoS defense error amplified attack on Azure, leading to outage

A DDoS attack that started on Tuesday has made a number of Microsoft Azure and Microsoft 365 services temporarily inaccessible, the company has confirmed. Microsoft’s mitigation statement on the Azure status history page Microsoft Azure, ...

How Bots and AI are Fueling Disinformation

The rise of advanced AI and large language models has fundamentally altered the landscape of disinformation. The post How Bots and AI are Fueling Disinformation appeared first on Security Boulevard.

Fortanix expands Key Insight to enhance cryptographic security across hybrid environments

Fortanix announced a major expansion to the Key Insight solution, allowing organizations to discover, assess, and remediate their fragmented cryptographic security risks proactively. Key Insight can now scan on-premises services such as ...

From Geopolitics to Boardrooms: The Impact of the Kaspersky Ban 

On the heels of the recent U.S. ban on Kaspersky antivirus software, it was expected that Kaspersky would begin to remove resources in the U.S. However, few expected them to lay off all the U.S.-employee base with such efficiency. The post From ...

Gray Box Testing in Cybersecurity: Finding the Right Balance for Security

One critical method employed by security professionals to test systems’ strength and resilience is penetration testing. Gray-box testing is a balanced and practical approach that combines black-box and white-box testing elements. This blog ...

Cycode unveils Cycode AI to enhance ASPM platform with advanced security features

Cycode has unveiled Cycode AI, a suite of AI-powered features that are now embedded in the company’s Complete ASPM platform. This integration empowers security teams and developers to increase productivity, accelerate velocity, and gain ...

Ghostscript Vulnerability Actively Exploited in Attacks

A significant remote code execution (RCE) vulnerability was identified in the Ghostscript library, a widely used tool on Linux systems. This vulnerability, tracked as CVE-2024-29510, is currently being exploited in attacks, posing a severe risk ...

Innovative approach promises faster bug fixes

Modern software applications usually consist of numerous files and several million lines of code. Due to the sheer quantity, finding and correcting faults, known as debugging, is difficult. In many software companies, developers still search for ...

An Introduction to Cloud Computing for Linux Users

Linux, the open-source operating system renowned for its stability, security, and customizability, is a major force in cloud computing. Many cloud services are built on Linux, making them naturally compatible with existing Linux systems. Automate ...

Lineaje secures $20 million in funding to address software supply chain issues

Lineaje has unveiled a landmark $20 million Series A funding round led by Prosperity7 Ventures, Neotribe, and Hitachi Ventures, alongside existing investor Tenable Ventures. This significant investment underscores the escalating global demand for ...

Email Attacks Surge, Ransomware Threat Remains Elevated

There has been a dramatic rise in email attacks and ransomware incidents, with an Acronis report noting a staggering 293% increase in email attacks in the first half of 2024 compared to the same period in 2023. The post Email Attacks Surge, ...

Devo Technology launches data orchestration and SOC enhancements

Devo Technology is launching data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements, offering security teams data control, cost optimizations, and efficient automation. Security teams are grappling ...

SolarWinds Patch: Critical ARM Flaws Fixed Before Exploits

SolarWinds has recently addressed 8 critical vulnerabilities pertaining to its Access Rights Manager (ARM) software. This SolarWinds patch has been released prior to the SolarWinds security flaws being exploited in the wild. In this article, ...

Cohesity unveils enhanced GenAI capabilities for faster threat detection and recovery

Cohesity extended its first-mover advantage in GenAI detection and recovery capabilities with the addition of significant new enhancements to the Cohesity Data Cloud. These improvements allow customers to use Cohesity’s built-in AI capabilities ...

If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door 

Firewalls and VPN appliances are critical gateways. Like all on-prem systems, a vulnerability can lead to a compromise that is used to open the door for attackers.    The post If You are Reachable, You Are Breachable, and Firewalls & VPNs ...

IBM: Cost of Data Breach on Average Reaches $4.9 Million

An IBM analysis of 604 organizations published today finds the average cost of each breach, including lost revenue, has now reached $4.9 million. The post IBM: Cost of Data Breach on Average Reaches $4.9 Million appeared first on Security Boulevard.

Proficio launches ProBAS service to help organizations better prepare and respond to cyber attacks

Proficio has announced the roll out of its ProBAS Breach and Attack Simulation service. By rigorously testing an organization’s security defenses, ProBAS ensures they can prevent compromise events and detect attacks throughout the entire threat ...

What CISOs need to keep CEOs (and themselves) out of jail

Former Uber CISO Joe Sullivan, who was convicted for attempting to cover up a data breach Uber suffered in 2016, recently posited that in the very near future, CEOs might find themselves held directly responsible for cybersecurity breaches. ...

Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave

Secretive is an open-source, user-friendly app designed to store and manage SSH keys within the Secure Enclave. Typically, SSH keys are stored on disk with appropriate permissions, which is usually sufficient. However, it’s not overly ...

Cybersecurity jobs available right now: July 31, 2024

Cloud Security Architect Precisely | United Kingdom | Remote – View job details As a Cloud Security Architect, you will be responsible for the design and architecture of Precisely’s cloud security posture. Determine security ...