Application Security News and Articles


What are Update Rings and Why are they Important? 

Keeping IT environments up-to-date with the latest software patches and updates is crucial for maintaining security, stability and performance. As anRead More The post What are Update Rings and Why are they Important?  appeared first on ...

Worldwide Outages Caused by CrowdStrike Security Tool

BSODs beyond belief: A buggy update to CrowdStrike Falcon made Windows PCs and servers crash—globally. The post Worldwide Outages Caused by CrowdStrike Security Tool appeared first on Security Boulevard.

Two of Wallarm’s Open-source Tools Have Been Accepted into Black Hat Arsenal 2024

We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek - not just one, but TWO of Wallarm's open-source tools will be featured in the Arsenal showcase at Black Hat USA this year. Black Hat Arsenal unites ...

Forcepoint GenAI Security prevents unauthorized data sharing

Forcepoint unveils its comprehensive GenAI Security solution, offering visibility, control, and risk-based data protection across generative AI platforms, including integration with OpenAI’s ChatGPT Enterprise Compliance API. Part of ...

Netskope extends risk management to OpenAI’s ChatGPT Enterprise

Netskope announced an integration with OpenAI‘s ChatGPT Enterprise Compliance API to deliver API-enabled controls that bolster security and compliance for enterprise organizations using generative AI (genAI) applications. Through this ...

Faulty CrowdStrike update takes out Windows machines worldwide

Houndreds of housands and possibly millions of Windows computers and servers worldwide have been made inoperable by a faulty update of Crowdstrike Falcon Sensors, and the outage affected transport, broadcast, financial, retail and other ...

Streamline User Management with LDAP Integration for Linux

Robust user authentication is essential for cybersecurity, preventing unauthorized access to systems and resources. LDAP (Lightweight Directory Access Protocol) provides a centralized solution for this challenge in Linux environments. By storing ...

Sleep More, Worry Less with Automated Detection and Monitoring of New VNets and VPCs

“The scariest thing in the world is a developer with a credit card” -CISO, F500 FinTech. VPCs and VNets spinning up without the knowledge of SecOps, NetOps, or CloudOps teams can give CISOs nightmares. All it takes is a few clicks in the ...

Juniper Networks Critical Security Update Released

Recent media reports have stated that a Juniper Networks vulnerability that could have led to an authentication bypass if exploited has now been patched. The authentication bypass flaw affects routers that operate in high-availability redundant ...

Importance of Vulnerability Assessment: Types and Methodology

A vulnerability assessment involves identifying, classifying, and prioritizing security vulnerabilities within an IT infrastructure. This comprehensive evaluation determines if an IT system is susceptible to known vulnerabilities. It also assigns ...

GenAI network acceleration requires prior WAN optimization

As GenAI models used for natural language processing, image generation, and other complex tasks often rely on large datasets that must be transmitted between distributed locations, including data centers and edge devices, WAN optimization is ...

One-third of dev professionals unfamiliar with secure coding practices

Attackers consistently discover and exploit software vulnerabilities, highlighting the increasing importance of robust software security, according to OpenSSF and the Linux Foundation. Despite this, many developers lack the essential knowledge ...

CISOs must shift from tactical defense to strategic leadership

Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, ...

New infosec products of the week: July 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s self-assessment tools allow audit teams to maintain focus on their critical ...

SARIF JSON Parser and converter tool

Streamline Your Security Analysis with the SARIF JSON Parser and SARIF to Excel ConverterContinue reading on Medium »

AT&T Data Breach: Understanding the Fallout

  As an AT&T customer, I did receive the unwelcome news that they suffered a data breach. Here is a rundown for what you should to know. BREACH DETAILS · This is a sizable data breach of about 109 million customers · Call and text ...

Google Cloud Security Threat Horizons Report #10 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report (full version) that we just released (the official blog for #1 report, my unofficial blogs ...

Nation-States and Zero-days Cranking Up the Heat

Summertime isn't just for vacations and barbecues—it's also prime season for zero-day attacks. These attacks, launched by malicious actors exploiting previously unknown vulnerabilities in software, are a significant concern for national ...

SAST – All About Static Application Security Testing

Static Application Security Testing (SAST) is a central part of application security efforts, so let’s get into the whats and whys behind this technology. The post SAST – All About Static Application Security Testing appeared first on ...

Capturing Exposed AWS Keys During Dynamic Web Application Tests

Overview We have recently identified several vulnerable HTTP requests that allow attackers to capture access keys and session tokens for a web application’s AWS infrastructure. Attackers could use these keys and tokens to access back-end IOT ...