Application Security News and Articles


CISOs must shift from tactical defense to strategic leadership

Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, ...

New infosec products of the week: July 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from AuditBoard, BlueVoyant, Druva, Invicti Security, and Rezonate. AuditBoard’s self-assessment tools allow audit teams to maintain focus on their critical ...

SARIF JSON Parser and converter tool

Streamline Your Security Analysis with the SARIF JSON Parser and SARIF to Excel ConverterContinue reading on Medium »

AT&T Data Breach: Understanding the Fallout

  As an AT&T customer, I did receive the unwelcome news that they suffered a data breach. Here is a rundown for what you should to know. BREACH DETAILS · This is a sizable data breach of about 109 million customers · Call and text ...

Google Cloud Security Threat Horizons Report #10 Is Out!

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report (full version) that we just released (the official blog for #1 report, my unofficial blogs ...

Nation-States and Zero-days Cranking Up the Heat

Summertime isn't just for vacations and barbecues—it's also prime season for zero-day attacks. These attacks, launched by malicious actors exploiting previously unknown vulnerabilities in software, are a significant concern for national ...

SAST – All About Static Application Security Testing

Static Application Security Testing (SAST) is a central part of application security efforts, so let’s get into the whats and whys behind this technology. The post SAST – All About Static Application Security Testing appeared first on ...

Capturing Exposed AWS Keys During Dynamic Web Application Tests

Overview We have recently identified several vulnerable HTTP requests that allow attackers to capture access keys and session tokens for a web application’s AWS infrastructure. Attackers could use these keys and tokens to access back-end IOT ...

USENIX Security ’23 – The Impostor Among US(B): Off-Path Injection Attacks On USB Communications

Authors/Presenters:Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

Survey: Nearly Half of SMEs Fell Victim to Cyberattack in Last Six Months

A survey shows that nearly half of all small-to-medium enterprises (SMEs) fell victim to cyberattacks in the first half of this year. The post Survey: Nearly Half of SMEs Fell Victim to Cyberattack in Last Six Months appeared first on Security ...

Future of Hybrid Cloud Security: New Approaches and Innovations

Understanding the risks associated with the cloud environment and adopting technologies, such as zero-trust network access, DSPM, generative AI and other security measures, helps mitigate the risks and strengthen the cloud posture. The post ...

Crossbeam Leverages DataGuard to Ensure HighLevel Data Protection

ABOUT Industry:Software Development Size:115 employeesPrivate Team:Chris Castaldo, CISO ABOUT CROSSBEAM Crossbeam is a collaborative 
data platform that helps companies build... The post Crossbeam Leverages DataGuard to Ensure HighLevel Data ...

CDK Global cyber attack: What businesses can learn & implement

The post CDK Global cyber attack: What businesses can learn & implement appeared first on Click Armor. The post CDK Global cyber attack: What businesses can learn & implement appeared first on Security Boulevard.

BTS #34 – EPSS – The Exploit Prediction Scoring System – Jay Jacobs, Wade Baker

Jay Jacobs Co-Founder and Data Scientist and Wade Baker Co-Founder; Data Storyteller from The Cyentia Institute come on the show to talk about The Exploit Prediction Scoring System (EPSS). Show Notes The post BTS #34 - EPSS - The Exploit ...

Randall Munroe’s XKCD ‘Hatchery’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Hatchery’ appeared first on Security Boulevard.

The Impact of SEC Cyber Rules on Corporate Risk Management

The post The Impact of SEC Cyber Rules on Corporate Risk Management appeared first on AI Enabled Security Automation. The post The Impact of SEC Cyber Rules on Corporate Risk Management appeared first on Security Boulevard.

Below The Surface Summer 2024

Welcome to the Summer 2024 edition of the Below the Surface Threat Report.  As the heat of summer continues, we continue to see increased attacks against VPN and firewall appliances and IoT devices. This season’s report delves deep into the ...

What You Need to Know to Align With the DoD’s New Zero Trust Overlays

The U.S. Department of Defense’s new document, Zero Trust Overlays, provides the most up-to-date guidance for applying zero trust concepts in DoD organizations. The document builds upon prior publications such as the DoD’s Zero Trust ...

Securing Cloud Applications: SCIM’s Role in Modern Identity Management

Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency. The post Securing ...

USENIX Security ’23 – Fuzz The Power: Dual-Role State Guided Black-box Fuzzing for USB Power Delivery

Authors/Presenters:Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave (Jing) Tian Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...