Application Security News and Articles


Heroes of Threat-Informed Defense: Tidal Cyber’s Diverse Users

Are you curious about the make-up of the Tidal Cyber user community?   It may surprise you to know that our users hail from very diverse roles within the security and risk management departments of an enterprise. On the other hand, it makes ...

Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own

Steamboat bloat: Hacktivist group wields infostealer Trojan, leaks 1,200 GB of mouse droppings. The post Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own appeared first on Security Boulevard.

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #298 – Fired Half of Scrum Masters

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

OSC&R Report Exposes Software Supply Chain Security Vulnerabilities

First Annual Report Analyzes Millions of Vulnerabilities Against the Industry’s First Supply-Chain Specific Attack Matrix Software is the foundation on which today’s businesses operate. From standard enterprise applications like customer ...

Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign

The APT group Void Banshee exploited a now-patched Windows security flaw and the retired Internet Explorer browser to distributed the Atlantida malware to steal system information and sensitive data from victims. The post Void Banshee Group Used ...

5 Ways Account Protect Can Boost Your Security Posture & Customer Trust

Account fraud is a growing threat that can damage your reputation, lose customer trust, and lead to direct monetary losses. Learn how Account Protect can improve your security posture and keep your customers safe. The post 5 Ways Account Protect ...

Kaseya Awarded Over a Dozen Channel Program Badges

Kaseya is proud to announce its outstanding achievement as a winner of 14 Channel Program badges. These prestigious badges recognizeRead More The post Kaseya Awarded Over a Dozen Channel Program Badges appeared first on Kaseya. The post Kaseya ...

Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers

Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your ...

USENIX Security ’23 – FuncTeller: How Well Does eFPGA Hide Functionality?

Authors/Presenters:Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan (JV) Rajendrany Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the ...

Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative AI

Generative AI has great potential for scaling and automating security practices, but to be effective, organizations need to have a strong security foundation. The post Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud ...

Preparing for the Quantum Leap with Hybrid Certificates

It is a widely acknowledged fact that quantum computing poses a grave threat to traditional cryptography. As we prepare for the post-quantum era, transitioning to quantum-safe cryptography is a critical action item for all organizations. However, ...

Baffle Extends Encryption Reach to AWS Databases

Baffle today extended its ability to secure multitenant applications running on the Amazon Web Services (AWS) cloud to include the relational databases many of them are deployed on. The post Baffle Extends Encryption Reach to AWS Databases ...

SEG vs. SEG: How Threat Actors are Pitting Email Security Products Against Each Other With Encoded URLs

Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website. Oftentimes when SEGs detect URLs in emails that ...

Top 10 Compliance Automation Tools for 2024: An In-Depth Comparison

This blog dives into the top 10 compliance automation tools for 2024 to streamline your regulatory processes with ease. The post Top 10 Compliance Automation Tools for 2024: An In-Depth Comparison appeared first on Scytale. The post Top 10 ...

Appgate launches Malware Analysis Service to safeguard enterprises and government agencies

Appgate has unveiled its new Malware Analysis Service that mitigates cyberthreats for enterprises and government agencies by identifying and neutralizing malicious software. Appgate’s Malware Analysis and Research Team now offers two new ...

Compensating Controls: Security Through Prioritized Actions

Organizations often face technical and business constraints that make it difficult to implement standard security measures. Compensating controls offer a solution by providing alternative security measures that effectively mitigate risk to an ...

Critical OpenSSH Vulnerability (regreSSHion) Gives Root Access

An unauthenticated remote code execution vulnerability (CVE-2024-6387) was discovered in OpenSSH, a widely used tool for secure remote access. Dubbed “regreSSHion”, this race condition vulnerability allows attackers to take complete control ...

Invicti API Security uncovers hidden and undocumented APIs

Invicti announced Invicti API Security, merging comprehensive API discovery with proactive security testing into a single solution. The growth of service-based architectures has driven an explosion in APIs, creating yet another expanding attack ...

SCA vs SAST — Security Tools Comparison

In this article, we are focusing on their capabilities and common uses of purpose tool and then break down some information to compare SCA…Continue reading on ByteHide »

OpenText Cloud Editions 24.3 elevates human potential

OpenText announced its latest product innovations with Cloud Editions (CE) 24.3. This release represents a significant leap forward in integrating advanced information management capabilities, trusted cloud solutions, robust security measures, ...