Application Security News and Articles


New Capabilities with the September Release of the HYAS Platform

New Product Release News You use the HYAS platform today to better protect and defend your organization from cyber threats like financial fraud, ransomware, and phishing. Now with the new September release of HYAS Protect Protective DNS and HYAS ...

SAST vs. DAST: Enhancing application security

As the threat landscape continues to evolve, organizations face a formidable challenge: ensure the security of their software applications. The post SAST vs. DAST: Enhancing application security appeared first on Security Boulevard.

A Deep Dive into ARMOR Level 3: Automated Response

The post A Deep Dive into ARMOR Level 3: Automated Response appeared first on Low-Code Security Automation & SOAR Platform | Swimlane. The post A Deep Dive into ARMOR Level 3: Automated Response appeared first on Security Boulevard.

Snatch Ransomware: SafeBreach Coverage for US-CERT Alert (AA23-263A)

Snatch ransomware, using the ransomware-as-a-service model, has been observed targeting a wide range of critical infrastructure sectors. The post Snatch Ransomware: SafeBreach Coverage for US-CERT Alert (AA23-263A) appeared first on ...

From Distrust to Dependability: Transforming Cyber Risk Quantification with Balbix

This blog is part 2 of our ongoing series focused on reshaping trust in CRQ. In the earlier part of this blog series, we delved deep into the challenges plaguing the world of CRQ. We underscored how the pervasive lack of trust and accountability ...

Every Network Is Now an OT Network. Can Your Security Keep Up?

Many previously isolated OT networks, like manufacturing, processing, distribution, and inventory management, have now been woven into larger IT networks. The post Every Network Is Now an OT Network. Can Your Security Keep Up? appeared first on ...

Navigating the Digital Frontier in Cybersecurity Awareness Month 2023

ZTNA stands out as a solution that enables organizations to minimize their attack surface while ensuring the productivity and security of their remote workforce. The post Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 ...

GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them from purposefully targeting ...

Viavi Observer Sentry provides threat visibility into AWS environments

Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing AWS environments. The 2023 State of the Network study ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Mini Course: An Introduction to Software Vulnerability Research

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

The MGM Breach and the Role of IdP in Modern Cyber Attacks

A deep dive into the recent MGM breach and our insights into the actor behind the attack and possible mitigations. The post The MGM Breach and the Role of IdP in Modern Cyber Attacks appeared first on Ermetic. The post The MGM Breach and the Role ...

BlueVoyant Supply Chain Defense enhancements reduce issues in third-party ecosystems

BlueVoyant released new Supply Chain Defense (SCD) product offerings and services. BlueVoyant now provides a comprehensive solution to reduce cyber risk in organizations’ third-party ecosystems. BlueVoyant has added more options for ...

Improving Patient Care, One Record at a Time

Personal health information (PHI) is among the most sensitive data stored by any organization. It is classified by the GDPR as “special category” data which must be treated with greater care as it could create“significant risks to the ...

Dig enhances its platform to protect enterprise data in all storage environments

Dig has expanded the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software as a service (SaaS), database as a service (DBaaS) and on-premise environments. Dig’s data ...

Automating Kubernetes Cost Reductions: Rosie’s Reminders

If you have not seen part 1, I suggest you start there to read about the concept and architecture for this project. We are building … The post Automating Kubernetes Cost Reductions: Rosie’s Reminders appeared first on Cyral. The post ...

Threat modeling and the supply chain: An essential tool for managing risk across the SDLC

As organizations seek better ways to establish secure-by-design software, threat modeling can play a huge role in anticipating, avoiding, and planning for potential risks in software across all phases of the software development lifecycle (SDLC) ...

Adversaries Are Using Automation. Software Vendors Must Catch Up

Attackers are using automation to escalate their attacks. Here’s why and how you can use automation to defend your apps, software and codebase. The post Adversaries Are Using Automation. Software Vendors Must Catch Up appeared first on ...

TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data

TransUnion denies suffering a breach after a hacker publishes 3GB of data allegedly stolen from the credit reporting firm. The post TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data appeared first on SecurityWeek.

Legit Security Raises $40 Million in Series B Financing

Legit Security raises $40 million in a Series B funding round led by CRV to help organizations protect the software supply chain from attacks The post Legit Security Raises $40 Million in Series B Financing appeared first on SecurityWeek.

Vague in the Hague: Who Is Behind the ICC Data Breach?

The International Criminal Court (ICC) in The Hague, one of the world’s most prominent institutions dealing with war crimes, has reported a breach in its computer system this week.  The ICC detected unusual activity on its computer network, ...