Application Security News and Articles


Response to CISA Advisory (AA24-193A): CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth

AttackIQ has released two new assessment templates in response to the CISA Advisory (AA24-193A) published on July 11, 2024, that disseminates Tactics, Techniques and Procedures (TTPs), mitigation and detection methods associated with SILENTSHIELD ...

Caught in the Act: StealC, the Cyber Thief in C

Weekly Threat Intelligence Report Date: July 15, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS StealC seems like an appropriate name for stealer malware written in C. It’s been available for less than two years ...

Hacking Scientific Citations

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors’ names, publication ...

Randall Munroe’s XKCD ‘Number Line Branch’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Number Line Branch’ appeared first on Security Boulevard.

Beware of the Latest Phishing Tactic Targeting Employees

Found in Environments Protected By: Google, Outlook 365, Proofpoint By Sabi Kiss, Cofense Phishing Defense Center Phishing attacks are becoming increasingly sophisticated, and the latest attack strategy targeting employees highlights this ...

Mythic 3.3 Beta: Rise of the Events

A brief overview of Mythic 3.3’s new features Eventing Flows Mythic 3.3 Updates Mythic 3.3 has too many updates to mention them all here, so if you want a deeper dive into the change log, please check it out on GitHub. Instead, we’re going ...

CEO Corner: Building a Stronger Future Together: Nuspire and PDI Technologies

I’m thrilled to share some exciting news with you that will not only take our ability to serve you to the next level but also bring significant benefits to you. As you may have heard, Nuspire has been acquired by PDI Technologies, a global ...

What Happens When Scammers Get Their Hands on Artificial Intelligence?

AI-powered scams are becoming increasingly sophisticated, making distinguishing between legitimate and fraudulent communications harder. Learn about the different types of AI scams, their risks, and how to protect yourself from falling ...

Encoding Differentials: Why Charset Matters

The absence of charset information seems to be a minor issue for a web application. This blog post explains why this is a false assumption and highlights the critical security implications. The post Encoding Differentials: Why Charset Matters ...

USENIX Security ’23 – Back to School: On the (In)Security of Academic VPNs

Authors/Presenters:Ka Lok Wu, Man Hong Hue, Ngai Man Poon, Kin Man Leung, Wai Yin Po, Kin Ting Wong, Sze Ho Hui, Sze Yiu Chau Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the ...

AuditBoard’s self-assessment tools allow audit teams to maintain focus on their critical work

AuditBoard launched of out-of-the-box (OOTB) self-assessment tools that enable internal auditors to easily assess and streamline conformance with the new Institute of Internal Auditors (IIA) Global Internal Audit Standards (“Standards”) that ...

Yubico and Straxis enable secure access to protected DOD websites and services

Yubico and Straxis launched a new Secure Web browsing application called MilSecure Mobile. This application can be adopted by any Defense Department (DOD) organization to enable secure access to protected DOD websites and services by service ...

Olympic Gold at Risk: AI Cybercriminals Target 2024 Games.

The Summer Olympic Games will be held in Paris this year, and while the athletes will be focused on breaking world records, there are plenty of opportunistic cyberthreat actors who will be focused on breaking into the event’s complex, ...

Best Strategies to Reduce Generative AI Risk

Generative AI stands as one of the most transformative technologies of our era. However, with its vast potential comes significant responsibility. The rise of generative AI brings forth notable risks that need careful management to ensure the ...

Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)

The maintainers of the Exim mail transfer agent (MTA) have fixed a critical vulnerability (CVE-2024-39929) that currently affects around 1.5 million public-facing servers and can help attackers deliver malware to users. About CVE-2024-39929 The ...

BlueVoyant Cyber Defense Platform helps organizations reduce cyber risk

BlueVoyant unveiled its innovative Cyber Defense Platform. The platform integrates internal, external, and supply chain defense solutions into a single, cloud-native platform designed to measure and strengthen cyber defense posture in a ...

How to Setup SendGrid DMARC, SPF, and DKIM Records? Easy Step-by-Step Guide

Reading Time: 3 min Learn how to set up SendGrid DMARC, SPF, and DKIM records with our easy step-by-step guide. Protect your domain from phishing and spoofing attacks. The post How to Setup SendGrid DMARC, SPF, and DKIM Records? Easy ...

Scytale Named Leader in G2’s Summer Reports

Scytale named G2's summer 2024 Leader in governance, risk, & compliance, Momentum Leader, & High Performer in cloud and security compliance! The post Scytale Named Leader in G2’s Summer Reports appeared first on Scytale. The post ...

Debian 12.6 Released with 84 Security Updates and 162 Bug Fixes

The Debian Project announced the release of Debian 12.6 on June 29, 2024, marking the fifth ISO update to its stable Debian 12 “Bookworm” series. Released four and a half months after Debian 12.5, it continues to leverage the Linux kernel 6.1 ...

600 Cybercrime Servers Linked To Cobalt Strike Shutdown

Recent news reports have brought to light a law enforcement operation codenamed MORPHEUS. The operation was conducted against the threat actors using the Cobalt strike  tool as part of their attack infrastructure and has led to the shutdown of ...