Application Security News and Articles


Providing Security Updates to Automobile Software

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight years after their purchase date. Samsung and Google provide Android OS updates and ...

VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)

Ransomware operators have been leveraging CVE-2024-37085, an authentication bypass vulnerability affecting Active Directory domain-joined VMware ESXi hypervisors, to gain full administrative access to them and encrypt their file system. VMware ...

OCI Customers Can Now Externally Manage Encryption Keys from a Cloud-Based Service

OCI Customers Can Now Externally Manage Encryption Keys from a Cloud-Based Service madhav Tue, 07/30/2024 - 10:20 Oracle stands apart by offering a comprehensive suite of services across all its cloud delivery models, from Oracle Alloy and ...

The Complete 2024 Crawler List You Need to Identify All Web Crawlers

The most completed and up to date crawlers list including the most common ones, the top SEO and TOOLS crawlers The post The Complete 2024 Crawler List You Need to Identify All Web Crawlers appeared first on Security Boulevard.

Too big to care? – Our disappointment with Cloudflare’s anti-abuse posture

Cloudflare, best known for its content delivery network (CDN), is marketed as a “Connectivity Cloud”. Part of its offering is protecting a vast number of websites from DDoS attacks [1]. However, its attitude to abuse management and prevention ...

Ubuntu Fixes Two OpenVPN Vulnerabilities

Two vulnerabilities were discovered in openvpn, a virtual private network software which could keep the closing session active or result in denial of service. Canonical released security updates to address these vulnerabilities in affected Ubuntu ...

Report: An 18% Increase in Ransomware Attacks Includes $75M Payment

A report published today by Zscaler finds an 18% increase in ransomware attacks, including one that involved a record $75 million payment that appears to have been made to the Dark Angels ransomware group. The post Report: An 18% Increase in ...

Cisco Security Patches: Max Severity Security Flaw Fixed

Cisco has recently released patches pertaining to a maximum severity security flaw. As per recent reports, the Cisco security patches are for flaws within the Smart Software Manager On-Prem (Cisco SSM On-Prem). In this article, we’ll dive into ...

DataDome to Demo Discover, an Innovative Tool to Eliminate Cyberfraud Blind Spots, at Black Hat USA 2024

With Discover, a new capability in the DataDome Cyberfraud Protection Platform, enterprises can better understand and protect their attack surface. The post DataDome to Demo Discover, an Innovative Tool to Eliminate Cyberfraud Blind Spots, at ...

Are Free Distributions of OpenJDK Safe to Use?

All Java builds that pass the TCK suite of tests, even free distributions of OpenJDK, are compliant with Java SE standards and safe to use. The post Are Free Distributions of OpenJDK Safe to Use? appeared first on Azul | Better Java ...

Review: Action1 – Simple and powerful patch management

Although endpoint anti-malware and other security controls are now standard at the operating system level, keeping all endpoint software up-to-date and secure remains an open issue for many organizations. Patch management is not yet a commodity, ...

Securing remote access to mission-critical OT assets

In this Help Net Security interview, Grant Geyer, Chief Strategy Officer at Claroty, discusses the prevalent vulnerabilities in Windows-based engineering workstations (EWS) and human-machine interfaces (HMI) within OT environments. Geyer also ...

Coding practices: The role of secure programming languages

Safety and quality are not features that can be added through testing — they must be integral to the design. Opting for a safer or more secure language or language subset during implementation can eliminate entire categories of vulnerabilities. ...

Insecure file-sharing practices in healthcare put patient privacy at risk

Healthcare organizations continue to put their business and patients at risk of exposing their most sensitive data, according to Metomic. 25% of publicly shared files owned by healthcare organizations contain Personally Identifiable Information ...

Risk and Reward of APIs and Third-Party Connectors in the Cloud

Risk and Reward of APIs and Third-Party Connectors in the Cloud 7 min read·Just now -- A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer. Third-party connectors through an ...

Deploy API Security On-Premises with New Imperva API Security Anywhere Self-Managed Option

API Security Anywhere Self-Managed Option Imperva continues to deliver solutions that help customers protect their applications and APIs, whether in the Cloud, on-premises, or in a hybrid environment. Imperva API Security includes a SaaS-based ...

Detecting Externally Facing Resources

In November 2009, as coach of a youth baseball team, I received a Google Sheet with the names, birthdays, contact information, and team names for about 30 kids born between 1997 and 2000. More than 14 years later, I still have access to that ...

Ostrich Cyber-Risk Recognized in 2024 Gartner® Hype Cycle™ for Cyber-Risk Management 

Ostrich Cyber-Risk announces its inclusion in the 2024 Gartner® Hype Cycle™ for Cyber-Risk Management as a Sample Vendor for Cyber-Risk Quantification (CRQ), earning a "High" benefit rating. This recognition underscores Ostrich's commitment to ...

USENIX Security ’23 – Device Tracking via Linux’s New TCP Source Port Selection Algorithm

Authors/Presenters:Moshe Kol, Amit Klein, Yossi Gilad Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #299 — Motivation and Reality

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...