Application Security News and Articles


Randall Munroe’s XKCD ‘A Crossword Puzzle’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘A Crossword Puzzle’ appeared first on Security Boulevard.

Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen)

DeFAIL: Cryptocurrency fans lose their worthless tokens via phishing attacks on decen­tral­ized finance sites. The post Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen) appeared first on Security Boulevard.

It Shouldn’t Take an Act of Congress to Make IT Products Secure

“Consumers and businesses alike expect that cars and other products they purchase from reputable providers will not carry risk of harm. The same should be true of technology products … Cyber-intrusions are a symptom rather than a cause of the ...

Fuzzing JSON to find API security flaws

Learn how to fuzz JSON to find security vulnerabilities in the APIs you are hacking with the help of a custom wordlist and Param Miner. The post Fuzzing JSON to find API security flaws appeared first on Dana Epp's Blog. The post Fuzzing JSON to ...

USENIX Security ’23 – “All Of Them Claim To Be The Best”: Multi-Perspective Study Of VPN Users And VPN Providers

Authors/Presenters:Reethika Ramesh, Anjali Vyas, Roya Ensafi Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

Phish Out of Water

PHISHING SCHOOL Bypassing Web Proxies so Your Phish Don’t Suffocate You just fought long and hard to convince a user to click on your link. They are dying to know about the contents of your macro enabled excel file. So, don’t let web proxies ...

Secureworks Taegis ManagedXDR Plus enhances cybersecurity for mid-market customers

Secureworks launched Taegis ManagedXDR Plus, a new Managed Detection and Response (MDR) offering that liberates the mid-market from indistinct, cookie cutter security solutions that don’t meet their unique security requirements. This ...

Void Banshee APT exploited “lingering Windows relic” in zero-day attacks

The zero-day exploit used to leverage CVE-2024-38112, a recently patched Windows MSHTML vulnerability, was wielded by an APT group dubbed Void Banshee to deliver malware to targets in North America, Europe, and Southeast Asia, threat hunters with ...

Druva unveils data security capabilities to accelerate incident response

Druva announced new capabilities to help its customers accelerate the investigation and remediation of cyber threats. The new Threat Hunting capability empowers IT and security teams to search their global data footprint for indicators of ...

CSA updates its vendor-neutral cloud security training with CCSK v5 release

The Cloud Security Alliance (CSA) demonstrated its commitment to improving its vendor-neutral cloud security training with the release of the Certificate of Cloud Security Knowledge (CCSK) v5, furnishing cloud stakeholders with the skills they ...

Cequence Integration with F5 High Speed Logging (HSL) Enhances API Security Visibility

Cequence integrates with F5’s High Speed Logging (HSL) solution, providing another zero-latency passive deployment option. This integration enables Cequence to receive and process network traffic directly from the F5 appliance in order to ...

Rezonate boosts security for both human and non-human identities

Rezonate unveiled unified coverage from human to non-human identity security (NHI) with comprehensive capabilities: identity inventory and visibility, security posture, compliance, and identity threat detection and response (ITDR). The platform ...

Three Ways Ox Security Helps You Achieve FedRAMP

Compliance mandates are a fact of life for security teams. There is no shortage of rules and regulations businesses must meet to certify that their organizations are architecting to specified standards for data handling, access controls, testing ...

Harmonic Protect helps security teams secure sensitive data

Harmonic Security launched Harmonic Protect which empowers security teams with the tools to protect sensitive data without the headaches of labeling and complex rules. CISOs using Harmonic have coined it “zero-touch data protection” for its ...

Hotel Wi-Fi: A Hotspot for Cyber Threats

Wi-Fi has become an essential utility, one we expect to access wherever we go. It’s particularly true for hotels, where guests expect seamless internet connectivity – to do their jobs while traveling, to stream entertainment while on ...

Arkose Labs Takes the CISA Pledge

Arkose Labs recently added its name to the list of companies taking the Secure by Design Pledge with the Cybersecurity and Infrastructure Security Agency (CISA). The voluntary pledge focuses on enterprise software products and services, with a ...

Vulnerability Management Lifecycle: The Ultimate Guide to Business Security

63% of organizations suffered cyberattacks due to unpatched vulnerabilities, highlighting a critical issue. However, top-tier companies consistently maintain superior security. How do they do it? Their advantage lies in a robust... The post ...

API Transformation Cyber Risks and Survival Tactics

As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data associated with them. The post API Transformation Cyber Risks and Survival Tactics appeared first ...

GlobalSign updates ACME service to simplify domain management

GMO GlobalSign announced updates to its Automated Certificate Management Environment (ACME) service for internal domain certificates, enabling customers to issue GlobalSign IntranetSSL certificates through its ACME service. ACME is an internet ...

Story 4: Detecting compromised secrets & naughty 3rd-party vendors

Join Astrix customers as they lead the non-human identity security frontier in this series “The Astrix stories: Real customer wins”. From building an automated process around NHI offboarding, to a collaboration between security and ...