Application Security News and Articles


BlackBerry CylanceMDR Pro increases visibility and boosts security posture

BlackBerry launched CylanceMDR Pro, a managed detection and response (MDR) service built on an Open XDR platform powered by AI. Designed to tackle the growing challenges of modern cybersecurity, CylanceMDR Pro overcomes the operational burden ...

Waterfall Security HERA secures OT environments

Waterfall Security launched HERA – Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organizations to reap the operational and ...

Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)

Cisco has fixed two critical vulnerabilities that may allow attackers to overwrite files on its Secure Email Gateways (CVE-2024-20401) and change the password of any user on its Smart Software Manager On-Prem license servers (CVE-2024-20419). ...

NETSCOUT delivers IT observability for remote locations at the digital edge

NETSCOUT introduced its new suite of Business Edge Observability products, including the nGenius Edge Sensor and Remote InfiniStreamNG solutions to deliver IT observability for remote locations at the digital edge. As the prevalence and ...

AI-Enabled Digital Messaging: From Political Campaigns to Influence Operations

Nisos AI-Enabled Digital Messaging: From Political Campaigns to Influence Operations Nisos analysts are keeping a close eye on how both official and covert actors are using AI to influence elections... The post AI-Enabled Digital Messaging: From ...

Data Breaches Impact Growing Number of Victims, ITRC Finds

The number of data breach victims in the first half (H1) of 2024 has surged to 1,078,989,742, marking a 490% increase compared to the same period in 2023, which saw 182,645,409 victims. The post Data Breaches Impact Growing Number of Victims, ...

No Trespassing: Challenges In Stopping Unauthorized AI Data Scraping

Data scrapers used to train LLMs can be evasive. Here's our recent view of AI data scraping attempts against Kasada customers. The post No Trespassing: Challenges In Stopping Unauthorized AI Data Scraping appeared first on Security Boulevard.

NDAY Security ATTACKN identifies critical exploitable security vulnerabilities

NDAY Security unveiled the latest release to its automated offensive security platform, ATTACKN. This all-in-one platform enables organizations to deploy, monitor, and manage critical offensive security measures, including: Point-in-time ...

Content Scraping: What It is and How to Prevent It

Content scraping is an unethical and illegal practice that can damage your site’s SEO and reputation. Learn how to recognize and prevent content scraping with DataDome. The post Content Scraping: What It is and How to Prevent It appeared first ...

AppViewX PQC Test Center helps organizations prepare and achieve PQC resiliency

AppViewX announced the AppViewX PQC Test Center, which allows organizations to assess their PQC readiness and take steps to achieve PQC resiliency. This free online service enables users to generate and test Quantum-Safe certificates today. ...

CapraRAT Spyware Masks As Popular Android Apps

In the realm of cybercrime, a threat actor by the name of Transparent Tribe is rapidly spreading the CapraRAT spyware by disguising it as popular Android apps. Media reports claim that these attacks are part of a larger social engineering ...

Fighting AI-powered synthetic ID fraud with AI

Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. For security professionals, the challenge lies in staying one step ...

Hacker Leaks Data of More Than 15 Million Trello Users

A hacker who calls themselves "emo" says they accessed the information of 15 million Trello users in January through an unsecured REST API endpoint and six months later leaked the information on an underground forum. The post Hacker Leaks Data of ...

Laying the groundwork for zero trust in the military

In this Help Net Security interview, Curtis Arnold, VP and Chief Scientist at Core4ce, discusses the starting points for military training in zero trust principles, emphasizing foundational technologies and a unified taxonomy. Arnold provides ...

Grype: Open-source vulnerability scanner for container images, filesystems

Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) tool. Find vulnerabilities for major operating system packages Alpine ...

Signatures should become cloud security history

It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for ...

The Path to Modernizing Your Home-Grown Case Management System 

Learn how to leverage your current challenges to drive support for a purpose-built case management solution As a corporate security leader responsible for investigations, your primary objective is to keep your people and assets safe. Despite the ...

Unconstrained Delegation in Active Directory

Overview Unconstrained delegation is a feature in Active Directory that allows a computer, service, or user to impersonate any other user and access resources on their behalf across the entire network, completely unrestricted. A typical example ...

USENIX Security ’23 – ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation

Authors/Presenters:Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

New Integration: EasyDMARC Integrates with Entri to Simplify DNS Record Management

Integration with other tools that help enhance your ... The post New Integration: EasyDMARC Integrates with Entri to Simplify DNS Record Management appeared first on EasyDMARC. The post New Integration: EasyDMARC Integrates with Entri to Simplify ...