Application Security News and Articles


Some good may come out of the CrowdStrike outage

Estimated financial losses due to the recent massive IT outage triggered by the faulty CrowdStrike update are counted in billions, but the unfortunate incident is having several positive effects, as well. Some silver linings As CrowdStrike was ...

HealthEquity: 4.3 Million People Affected by Data Breach

Some 4.3 million people had their personal and health care information compromised by hackers who were were able to access the data by breaching the account of a business partner of HealthEquity. The post HealthEquity: 4.3 Million People Affected ...

AI-Powered Cybersecurity: How Artificial Intelligence is Transforming the OSI Model

Explore the OSI model's 7 layers, their vulnerabilities in the cybersecurity landscape, and how AI is revolutionizing defense strategies for each layer. The post AI-Powered Cybersecurity: How Artificial Intelligence is Transforming the OSI Model ...

WTH? Google Auth Bug Lets Hackers Login as You

G Suite Sours: Domain owners flummoxed as strangers get Google for their domains. The post WTH? Google Auth Bug Lets Hackers Login as You appeared first on Security Boulevard.

USENIX Security ’23 – Did the Shark Eat The Watchdog In The NTP Pool? Deceiving The NTP Pool’s Monitoring System

Authors/Presenters:Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Crowdstrike outage: Growing scams amid global outage

The post Crowdstrike outage: Growing scams amid global outage appeared first on Click Armor. The post Crowdstrike outage: Growing scams amid global outage appeared first on Security Boulevard.

The NIS2 Directive: Implications for Your Organization

Learn about the NIS2 Directive's impact on your organization and key steps for compliance with new cybersecurity standards. The post The NIS2 Directive: Implications for Your Organization appeared first on Scytale. The post The NIS2 Directive: ...

API Posture Management – Common Topics We’re Asked About

This article is the second in a series of six covering key API security topics and provides some answers to common questions we often get when talking to potential customers. The series will cover the following topics: API Discovery API Posture ...

Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)

CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure Acronis is a privately held Swiss cybersecurity and data protection technology ...

DON’T GET PWNED! Securing Yourself at Black Hat

Black Hat, one of the world’s largest security conferences, is a veritable playground for hackers. With thousands of security professionals and enthusiasts gathered in one place, it’s an irresistible target for those looking to exploit ...

Over 1 Million websites are at risk of sensitive information leakage – XSS is dead. Long live XSS

Intro Cross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular web vulnerabilities. Since its first emergence, somewhere in the dark days of the internet, countless vulnerabilities have been found across websites ...

eBook: 20 tips for secure cloud migration

More organizations rely on cloud platforms to reap the benefits of scalability, flexibility, availability, and reduced costs. However, cloud environments come with security challenges and vulnerabilities. The Thales 2020 Data Threat Report ...

Microsoft 365 users targeted by phishers abusing Microsoft Forms

There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their Microsoft 365 login credentials. A malicious Microsoft form (Source: Perception Point) Malicious forms leading to ...

Why Biometrics are Key to a Safe Paris Olympics

Biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. The post Why Biometrics are Key to a Safe Paris Olympics appeared first on Security Boulevard.

Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU

The European Union (EU) is currently confronting a significant surge in cyberattacks, primarily originating from Russia and these brute-force assaults are targeting corporate and institutional networks. The post Russia-Backed Brute-Force Campaign ...

Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security Processes

LLMs have introduced a greater risk of the unexpected, so, their integration, usage and maintenance protocols should be extensive and closely monitored. The post Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security ...

Linux Evolution: A Comprehensive Timeline

Linus Torvalds, a Finnish computer science student, started Linux as a hobby project in 1991. Linux now powers the world’s top supercomputers, cloud infrastructure, and even forms the foundation for Android, the leading mobile OS. In the server ...

Fighting Fire with Fire: Using AI to Thwart Cybercriminals

Organizations are increasingly implementing generative AI (GenAI) solutions to boost productivity and introduce new operational efficiencies. Unfortunately, so are cybercriminals, and they’re doing so with alarming effectiveness. The post ...

Cryptocurrency Theft: WazirX Loses $230 Million Amid Breach

WazirX, an Indian cryptocurrency exchange, has recently confirmed that it was targeted by threat actors who caused a security breach leading to the theft of $230 million in crypto assets. Media reports have confirmed that the attack occurred in ...

In the News | How K-12 Districts Can Control Access to YouTube Videos

This article was originally published in SmartBrief on 7/24/24 by David Waugh, CRO at ManagedMethods. YouTube can be a valuable teaching and learning tool, but content risks can be a problem in the K-12 environment. David Waugh of ManagedMethods ...