Application Security News and Articles


Are You Configured for Failure?

Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the cloud, making the system an ...

The Essential Role of Multi-Layered Defense and Role Based Access Control: OX Security’s Enhanced RBAC Functionality

Many debates have been started about where to put the first layer of defense in cybersecurity. Do you start at the network layer? At the data layer? On the endpoint? Around the application? The reality is that cybersecurity isn’t an ...

Securing Your Data Center Servers at the Component Level

As the operator of a large server fleet, your responsibility is to ensure the infrastructure running business-critical application workloads is secure and available. To this end, there are a number of security control frameworks and best ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #301 – Striking the Crowd

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Better Security and Performance For Free? Why PostgreSQL is Amazing

Upgrade your PostgreSQL instance to the newest version with confidence! In this benchmarking blog post, we show you the performance improvements you can expect when upgrading from PostgreSQL 13 to 16. The post Better Security and Performance For ...

Deploying AI/ML Workloads? GPU-Enabled Kubernetes Is the Right Fit

It seems like everyone is talking about artificial intelligence and machine learning (AI/ML) these days. As more organizations seek to incorporate AI and ML into their solutions, the need for processing power is growing rapidly. Graphics ...

Robot Dog Internet Jammer

Supposedly the DHS has these: The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company called Ghost Robotics. Benjamine Huffman, the director of DHS’s ...

USENIX Security ’23 – Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference

Authors/Presenters:Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating ...

Network of ghost GitHub accounts successfully distributes malware

Check Point researchers have unearthed an extensive network of GitHub accounts that they believe provides malware and phishing link Distribution-as-a-Service. Set up and operated by a threat group the researchers dubbed as Stargazer Goblin, the ...

ASP.NET Core Web Apps

Sonar recently added new rules for ASP.NET WebAPI and ASP.NET MVC. In this blog post, we discuss the details of these frameworks within ASP.NET Core and how Sonar’s solutions help keep your ASP.NET web apps clean and free of issues. The post ...

OT/ICS and IoT Incident Response Plan

What is an Incident Response Plan? Modern-day enterprises experience cybersecurity threats and risks are a part of everyday business. Therefore, protecting business assets requires pre-emptive and proactive measures, and IRP is one such approach ...

CISOs, CIOs Struggle with Data Protection Challenges in AI, Cloud Era

The shift to the cloud and the accelerated adoption of critical software as a service (SaaS) data applications has proven to be a security challenge for many chief information officers (CIOs) and chief information security officers (CISOs). The ...

Vanta raises $150 million accelerate its AI product innovation

Vanta announced that it has raised a $150 million Series C funding round at a valuation of $2.45 billion. The round was led by Sequoia Capital, in addition to new investors Growth Equity at Goldman Sachs Alternatives, J.P. Morgan and existing ...

Malware Exploit Bypasses SEGs Leaving Organizations at Risk

Threat actors continually leverage and create a plethora of tactics to bypass Secure Email Gateways (SEGs). These include encoding malicious URLs with other SEG protection tools, obfuscating file contents, and abusing SEG treatment of ...

CrowdStrike Admits it Doesn’t ‘Canary’ Test all Updates

Corporate incompetence: Beleaguered security firm issues initial post-mortem on Friday’s faux pas. The post CrowdStrike Admits it Doesn’t ‘Canary’ Test all Updates appeared first on Security Boulevard.

CrowdStrike blames buggy testing software for disastrous update

A bug in the Content Validator – a software element CrowdStrike relies on for testing and validating Rapid Response Content updates for its Falcon Sensors – is (partly) why the faulty update wasn’t caught in time, the company ...

How Salt Catches Low and Slow Attacks While Others Can’t

In the ever-evolving landscape of cybersecurity, API attacks pose significant threats to organizations. These attacks, particularly the low and slow variety, are notoriously challenging to detect and mitigate. Salt Security stands out as the ...

9 SecOps talks you don’t want to miss at Black Hat

Hacker Summer Camp (a.k.a. Black Hat USA 2024) is almost here, and it's going to be jam-packed once again with intriguing cybersecurity talks. With over 100 sessions to choose from over the span of just two days, leaders will need to take extra ...

The Importance of OT Security Training

The Need for OT Security Training The frequency and sophistication of cyberattacks targeting OT systems have increased significantly in recent years. According to CISA, the energy, manufacturing, and water sectors are particularly vulnerable due ...

Coalfire announces Cyber Security On-Demand portfolio

Coalfire announced its Cyber Security On-Demand portfolio to provide a flexible set of services that reduce cyber risks and remediate security vulnerabilities in customer environments. As attack surfaces grow, defenders need flexibility and a ...