Application Security News and Articles


The Road to CTEM, Part 3: BAS vs. Other Validation Technologies

Learn more about the top challenges and the different tools and techniques that can support continuous validation within a CTEM program. The post The Road to CTEM, Part 3: BAS vs. Other Validation Technologies appeared first on SafeBreach. The ...

Docker fixes critical auth bypass flaw, again (CVE-2024-41110)

A critical-severity Docker Engine vulnerability (CVE-2024-41110) may be exploited by attackers to bypass authorization plugins (AuthZ) via specially crafted API request, allowing them to perform unauthorized actions, including privilege ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape

In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email ...

Learning from CrowdStrike’s quality assurance failures

CrowdStrike has released a preliminary Post Incident Review (PIR) of how the flawed Falcon Sensor update made its way to millions of Windows systems and pushed them into a “Blue Screen of Death” loop. The PIR is a bit confusing to read and ...

Email Security Best Practices for Remote Work

Reading Time: 4 min Protect your sensitive data from cyber threats with our comprehensive guide to email security for remote work. Implement strong security measures to ensure secure remote operations. The post Email Security Best Practices for ...

CAST SBOM Manager automates creation and handling of SBOMs

CAST launched CAST SBOM Manager, a new freemium product designed for product owners, release managers, and compliance specialists. CAST SBOM Manager automates and simplifies the creation and handling of Software Bill of Materials (SBOMs), which ...

Ubuntu Patches Several Apache HTTP Server Vulnerabilities

Several security vulnerabilities were discovered in Apache HTTP server, which could lead to denial of service or exposure of sensitive information. Fortunately, they have been addressed in the new version and upgrading Apache HTTP server package ...

Lakera raises $20 million to secure GenAI applications

Lakera has raised $20 million in a Series A funding round. Led by European VC Atomico, with participation from Citi Ventures, Dropbox Ventures, and existing investors including redalpine, this investment brings Lakera’s total funding to $30 ...

PHP Vulnerability Used For Malware And DDOS Attacks

The cybercrime landscape has recently seen multiple threat actors exploiting a known PHP vulnerability. As per recent media reports, the vulnerability is exploited to deliver crypto miners, distributed denial-of-service (DDoS) botnets, and remote ...

Lessons Learned from the CrowdStrike Incident: Strengthening Organizational Resilience

On July 19, 2024, a major global digital catastrophe unfolded as a faulty Windows update led by cybersecurity firm CrowdStrike’s Falcon software caused widespread system crashes and service disruptions across vital sectors in over 20 countries. ...

BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements

BIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. BIND 9.20, a stable branch suitable for production use, has been released. According to the ...

How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than the Change Healthcare ...

Cloud security threats CISOs need to know about

In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, ...

Researchers expose GitHub Actions workflows as risky and exploitable

GitHub is an immensely popular platform, with over 100 million developers and over 90% of Fortune 100 companies utilizing it. Despite its widespread use, many GitHub Actions workflows remain insecure, often due to excessive privileges or ...

The most urgent security risks for GenAI users are all data-related

Regulated data (data that organizations have a legal duty to protect) makes up more than a third of the sensitive data being shared with GenAI applications—presenting a potential risk to businesses of costly data breaches, according to ...

KnowBe4 Unknowingly Hired Fake North Korean IT Worker

Cybersecurity company KnowBe4 unknowingly hired a North Korean operative who used a stolen identity and an AI-enhanced photo to get the software engineer job and then immediately began loading malware into the company's systems. The post KnowBe4 ...

The Future of Appsec is APIs | Impart Security

API security, microservices, decentralized applications, WAF, authentication, authorization, AI, security testing, response and enforcement, WAFs, security visibility, API exploitation The post The Future of Appsec is APIs | Impart Security ...

Guide your SOC Leaders to More Engineering Wisdom for Detection(Part 9)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. In this blog (#9 in the series), we will cover a few higher level elements for moving to detection ...

Securing Hugging Face Workloads on Kubernetes

In the rapidly evolving landscape of artificial intelligence (AI) and Large Language Models, the risk associated with implementing Generative AI […] The post Securing Hugging Face Workloads on Kubernetes appeared first on Security Boulevard.

USENIX Security ’23 – Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking

Authors/Presenters:Ilia Shevrin, Oded Margalit Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s ...