Application Security News and Articles


DON’T GET PWNED! Securing Yourself at Black Hat

Black Hat, one of the world’s largest security conferences, is a veritable playground for hackers. With thousands of security professionals and enthusiasts gathered in one place, it’s an irresistible target for those looking to exploit ...

Over 1 Million websites are at risk of sensitive information leakage – XSS is dead. Long live XSS

Intro Cross-site scripting (aka XSS) has rightfully claimed its place as one of the most popular web vulnerabilities. Since its first emergence, somewhere in the dark days of the internet, countless vulnerabilities have been found across websites ...

eBook: 20 tips for secure cloud migration

More organizations rely on cloud platforms to reap the benefits of scalability, flexibility, availability, and reduced costs. However, cloud environments come with security challenges and vulnerabilities. The Thales 2020 Data Threat Report ...

Microsoft 365 users targeted by phishers abusing Microsoft Forms

There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their Microsoft 365 login credentials. A malicious Microsoft form (Source: Perception Point) Malicious forms leading to ...

Why Biometrics are Key to a Safe Paris Olympics

Biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. The post Why Biometrics are Key to a Safe Paris Olympics appeared first on Security Boulevard.

Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU

The European Union (EU) is currently confronting a significant surge in cyberattacks, primarily originating from Russia and these brute-force assaults are targeting corporate and institutional networks. The post Russia-Backed Brute-Force Campaign ...

Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security Processes

LLMs have introduced a greater risk of the unexpected, so, their integration, usage and maintenance protocols should be extensive and closely monitored. The post Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security ...

Linux Evolution: A Comprehensive Timeline

Linus Torvalds, a Finnish computer science student, started Linux as a hobby project in 1991. Linux now powers the world’s top supercomputers, cloud infrastructure, and even forms the foundation for Android, the leading mobile OS. In the server ...

Fighting Fire with Fire: Using AI to Thwart Cybercriminals

Organizations are increasingly implementing generative AI (GenAI) solutions to boost productivity and introduce new operational efficiencies. Unfortunately, so are cybercriminals, and they’re doing so with alarming effectiveness. The post ...

Cryptocurrency Theft: WazirX Loses $230 Million Amid Breach

WazirX, an Indian cryptocurrency exchange, has recently confirmed that it was targeted by threat actors who caused a security breach leading to the theft of $230 million in crypto assets. Media reports have confirmed that the attack occurred in ...

In the News | How K-12 Districts Can Control Access to YouTube Videos

This article was originally published in SmartBrief on 7/24/24 by David Waugh, CRO at ManagedMethods. YouTube can be a valuable teaching and learning tool, but content risks can be a problem in the K-12 environment. David Waugh of ManagedMethods ...

Enhancing threat detection for GenAI workloads with cloud attack emulation

Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection mechanisms. Traditional cloud threat detection Threat detection ...

Cirrus: Open-source Google Cloud forensic collection

Cirrus is an open-source Python-based tool designed to streamline Google Cloud forensic evidence collection. It can streamline environment access and evidence collection in investigations involving Google Workspace and GCP. The tool simplifies ...

Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac

In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange insights about their history at Veracode and explore Dan’s journey in cybersecurity. Dan shares his experience in penetration testing, the origins ...

Why a strong patch management strategy is essential for reducing business risk

In this Help Net Security interview, Eran Livne, Senior Director of Product Management, Endpoint Remediation at Qualys and Thomas Scheffler, Security Operations Manager of Cintas Corporation, discuss their experiences with automated patch ...

The cost of cybersecurity burnout: Impact on performance and well-being

This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout experienced by cybersecurity professionals. Most cybersecurity pros took time off due to mental health issues ...

The gap between business confidence and cyber resiliency

In this Help Net Security video, Jim Liddle, Nasuni’s Chief Innovation Officer, discusses the findings of its new 2024 industry research report, The Era of Hybrid Cloud Storage. Key takeaways: Cloud strategies are at the forefront of ...

Whitepaper: DevSecOps Blueprint

In the DevSecOps Blueprint whitepaper, GitGuardian outlines a robust foundation for building an automated and technology-driven DevSecOps Program that addresses every aspect of the SDLC. Learn how your organization can embed security at every ...

USENIX Security ’23 – Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages

Authors/Presenters:Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Week in review: CrowdStrike-triggered outage insights, recovery, and measuring cybersecurity ROI

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update By now, most people are aware of – or have been ...