Application Security News and Articles


ThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks

Ransomware has been a daunting threat to organizations worldwide for decades. Recent trends show that ransomware attacks continue to grow more advanced and persistent. It’s become increasingly clear that no one is spared as cybercriminals carry ...

Detection Rules & MITRE ATT&CK Techniques

We Can Do Better As a Detection Engineer and Threat Hunter, I love MITRE ATT&CK and I whole-heartedly believe that you should too. However, there’s something about the way that some folks leverage MTIRE ATT&CK that has me concerned. ...

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

A hacker exploited a misconfiguration in Proofpoint's email protection platform to send millions of spoofed phishing emails from companies like IBM, Nike, and Disney looking to steal money and credit card information from victims. The post ...

GUEST ESSAY: CrowdStrike outage fallout — stricter regulations required to achieve resiliency

What does the recent CrowdStrike outage tell us about the state of digital resiliency? Related: CrowdStrike’s consolation backfires On a resiliency scale of one to 10, most enterprises are at about two. This was clear over the weekend when over ...

Strengthen SaaS Security Through Due Diligence

Download the Due Diligence Questionnaire for a comprehensive guide to understanding best security practices and monitoring SaaS applications logs. The post Strengthen SaaS Security Through Due Diligence appeared first on AppOmni. The post ...

Deepfactor 3.8 Introduces New Risk Prioritization Dashboard and SSO Support

... Read more » The post Deepfactor 3.8 Introduces New Risk Prioritization Dashboard and SSO Support appeared first on Deepfactor. The post Deepfactor 3.8 Introduces New Risk Prioritization Dashboard and SSO Support appeared first on Security ...

USENIX Security ’23 – An Efficient Design of Intelligent Network Data Plane

Distinguished Paper Award Winner Authors/Presenters:Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

News Alert: Adaptive Shield to showcase new ITDR platform for SaaS at Black Hat USA

 Las Vegas, Nev., July 30, 2024, CyberNewsWire — Amid rising breaches including Snowflake, the platform helps security teams proactively detect and respond to identity-centric threats in business-critical SaaS applications. Adaptive Shield, a ...

Randall Munroe’s XKCD ‘House Inputs and Outputs’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘House Inputs and Outputs’ appeared first on Security Boulevard.

NTLM Deprecation is Giving Us XP EOL Flashbacks: Are You Protected? 

Microsoft recently announced the deprecation of NTLM protocol for Windows client. This falls in line with Microsoft’s encouragement to move away from NTLM due to the security risks it introduces – and acts as a wakeup call that maintaining ...

SAST and Semgrep: Keys to Identifying Security Vulnerabilities Early

What is SAST?Continue reading on System Weakness »

Extending Resilience: Reducing Stress and Burnout for Cybersecurity Teams

Resilience is now the prevailing ethos and strategy for cybersecurity programs. This idea is typified by the axioms, “assume breach,” or “not if, but when.” Cybersecurity’s journey to a resilience model makes perfect sense against the ...

Adaptive Shield Showcases New ITDR Platform for SaaS at Black Hat USA

Today we’ve announced our breakthrough Identity Threat Detection & Response (ITDR) platform for SaaS environments. Since entering this space a year ago, we’ve already become a leader in the field, implementing the solution in hundreds of ...

HYAS Product Release News July 2024

Introduction HYAS is excited to share some important updates to both HYAS Protect and HYAS Insight, designed to strengthen your organization’s cybersecurity. For HYAS Protect, we’ve enhanced our categorization and content filtering ...

Mapping Attack Patterns to your Threat Model

Learn how to map MITRE CAPEC attack patterns to STRIDE threat model categories and improve your approach to security testing. The post Mapping Attack Patterns to your Threat Model appeared first on Dana Epp's Blog. The post Mapping Attack ...

Updates: ISO 27001 Mapping and Model Calibration | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Updates: ISO 27001 Mapping and Model Calibration | Kovrr appeared first on Security Boulevard.

Ransomware actors pivot away from major brands in Q2 2024

Unaffiliated ‘lone wolf’ threat actors carry out a greater share of attacks as they attempt to obfuscate their identity in Q2 2024. The post Ransomware actors pivot away from major brands in Q2 2024 appeared first on Security Boulevard.

The Matrix’s real villain is Neo, according to AI

The cyberpunk action classic movie The Matrix envisions a dystopian future where – spoiler alert! – the world humans see is actually a simulation fed to them by machine overlords. In reality, most people are bred and kept inside a vast grid ...

Adaptive Shield Showcases New ITDR Platform for SaaS at Black Hat USA

Las Vegas, Nevada, 30th July 2024, CyberNewsWire The post Adaptive Shield Showcases New ITDR Platform for SaaS at Black Hat USA appeared first on Security Boulevard.

Poseidon Infostealer, DoNex Ransomware, ElDorado Ransomware, and More: Hacker’s Playbook Threat Coverage Round-up: July 2024

New and updated coverage for ransomware and malware variants, including AI Threat Scenario, GuLoader, DarkGate, MirrorBlast, & Kutaki Stealer The post Poseidon Infostealer, DoNex Ransomware, ElDorado Ransomware, and More: Hacker’s Playbook ...