Application Security News and Articles


Happy System Administrator Appreciation Day 2024

You’re making sure your developers can develop, your managers can manage, your customers can … custom? Well, no, but you get the idea. You’re making sure everything runs smoothly. On a good day, nothing breaks and your job isn’t even ...

Networking Equipment Riddled With Software Supply Chain Risks

Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors. The post Networking Equipment Riddled With Software Supply Chain Risks appeared first on Security Boulevard.

Deepfake Attacks Prompt Change in Security Strategy

Organizations can keep their deepfake response plans current by continuously monitoring industry trends and integrating new technologies. The post Deepfake Attacks Prompt Change in Security Strategy appeared first on Security Boulevard.

Align Cloud Security with the Shared Responsibility Model

Operating a business primarily in the cloud is no longer a foreign concept for many businesses, and has become more of the norm. Cloud computing opens up a variety of doors for organizations, helping them quickly expand their operations while ...

Use ADS Programmable Rules to Customize Protection Capabilities

This document will guide you through the process of leveraging programmable rules in ADS to customize your protection capabilities. Unlike static solutions, the programmable defense allows you to create custom rules and policies that respond to ...

Veeam Backup Software Being Exploited By New Ransomware Group

As per recent reports, a Veeam vulnerability, that is now patched, is being exploited by an emerging threat actor group named EstateRansomware. The Veeam security flaw is present in its Backup & Replication software and can lead to severe ...

The Role of DDoS Stress Testing in DDoS Protection

Distributed Denial of Service (DDoS) attacks have become increasingly sophisticated, posing significant threats to businesses worldwide. Protecting assets and ensuring continuous availability of services is crucial for any organization. This blog ...

Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)

Progress Software has fixed a critical vulnerability (CVE-2024-6327) in its Telerik Report Server solution and is urging users to upgrade as soon as possible. About CVE-2024-6327 (and CVE-2024-6096) Telerik Report Server is an enterprise solution ...

16% of organizations experience disruptions due to insufficient AI maturity

While sysadmins recognize AI’s potential, significant gaps in education, cautious organizational adoption, and insufficient AI maturity hinder widespread implementation, leading to mixed results and disruptions in 16% of organizations, ...

AI-generated deepfake attacks force companies to reassess cybersecurity

As AI-generated deepfake attacks and identity fraud become more prevalent, companies are developing response plans to address these threats, according to GetApp. In fact, 73% of US respondents report that their organization has developed a ...

Most CISOs feel unprepared for new compliance regulations

With the new stringent regulations, including the SEC’s cybersecurity disclosure rules in the USA and the Digital Operational Resilience Act (DORA) in the EU, a significant challenge is emerging for many organizations, according to Onyxia ...

New infosec products of the week: July 26, 2024

Here’s a look at the most interesting products from the past week, featuring releases from GitGuardian, LOKKER, Permit.io, Secure Code Warrior, and Strata Identity. GitGuardian’s tool helps companies discover developer leaks on GitHub ...

A Guide to Open Source Software

Learn more about how organizations can use open source software to innovate while minimizing risk. The post A Guide to Open Source Software appeared first on Security Boulevard.

Learning from CrowdStrike’s Quality Assurance Failures

  Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused ...

Join Our Webinar: Zero Trust and IAM – Building a Secure Future

Join Our Webinar: Zero Trust and IAM – Building a Secure Future Join Our Webinar: Zero Trust and IAM – Building a Secure Future We are excited to invite you to an exclusive live webinar hosted by miniOrange in collaboration with SecureFLO. ...

Navigating Cybersecurity Legal Liabilities

Safeguarding your business with an emphasis on cybersecurity also means understanding potential legal liabilities The digital landscape offers opportunities for businesses to thrive and connect with consumers worldwide. However, these ...

Chainguard raises $140 million to strengthen open source software security

Chainguard has completed a $140 million Series C round of funding led by Redpoint Ventures, Lightspeed Venture Partners, and IVP, bringing the company’s total funding raised to $256 million. Existing investors, including Amplify, Mantis VC, ...

The Road to CTEM, Part 3: BAS vs. Other Validation Technologies

Learn more about the top challenges and the different tools and techniques that can support continuous validation within a CTEM program. The post The Road to CTEM, Part 3: BAS vs. Other Validation Technologies appeared first on SafeBreach. The ...

Docker fixes critical auth bypass flaw, again (CVE-2024-41110)

A critical-severity Docker Engine vulnerability (CVE-2024-41110) may be exploited by attackers to bypass authorization plugins (AuthZ) via specially crafted API request, allowing them to perform unauthorized actions, including privilege ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape

In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email ...