Application Security News and Articles


API Access Control: Optimizing your API Security

In the digital transformation era, APIs have become the glue that holds modern tech stacks together. APIs are critical for enabling seamless communication and data exchange between systems. However; the rise of API usage also presents significant ...

Security Automation for External Surface Scanning and SAST Integration

I believe good engineering has to be effective efficient and easy. So having these parameters in mind, How easily we can automate this and…Continue reading on Medium »

Risk related to non-human identities: Believe the hype, reject the FUD

The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and API keys – has recently skyrocketed. A steady stream of ...

Realm: Open-source adversary emulation framework

Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm is unique in its custom interpreter written in Rust. This allows us to ...

Discover the growing threats to data security

In this Help Net Security interview, Pranava Adduri, CEO at Bedrock Security, discusses how businesses can identify and prioritize their data security risks. Adduri emphasizes the necessity of ongoing monitoring and automation to keep up with ...

Authy Breach: What It Means for You, RockYou 2024 Password Leak

In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online. Find out why this file ...

Encrypted traffic: A double-edged sword for network defenders

Organizations are ramping up their use of encrypted traffic to lock down data. Could they be making it easier to hide threats in the process? On one hand, encryption means enhanced privacy, but it can also make the job of security analysts much ...

Pressure mounts for C-Suite executives to implement GenAI solutions

87% of C-Suite executives feel under pressure to implement GenAI solutions at speed and scale, according to RWS. Despite these pressures, 76% expressed an overwhelming excitement across their organization for the potential benefits of GenAI. ...

AT&T Data Breach: What Happened and How to Prevent It from Happening to Your Enterprise

AT&T Data Breach: What Happened and How to Prevent These Disasters. Discover the methods used by the hackers in the AT&T breach. The post AT&T Data Breach: What Happened and How to Prevent It from Happening to Your Enterprise appeared ...

AI and the Changing Face of Enterprise Security Threats

Explore how AI is revolutionizing enterprise security by improving threat detection, prevention, and response. Learn about the new challenges and opportunities that AI brings to the cybersecurity landscape. The post AI and the Changing Face of ...

Strengthening Digital Customer Onboarding to Combat Deep Fakes

As deepfake technology advances, the risk of fraudulent activities in digital customer onboarding increases. This article explores how to safeguard your onboarding processes against deepfakes, ensuring a secure and trustworthy experience for your ...

Google Nears $23 Billion Purchase Of Wiz: Reports

Alphabet Inc.’s Google is closing in on a $23 billion acquisition of cybersecurity firm Wiz – its largest purchase ever, according to published reports. The mega-deal, first reported by the Wall Street Journal on Sunday, is in advanced talks ...

USENIX Security ’23 – Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables

Authors/Presenters:Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

The Importance of AI and ML in Code Secret Scanner Applications

In the rapidly evolving landscape of software development, security remains a paramount concern.Continue reading on Medium »

Guarding Gold: Cybersecurity Challenges Ahead of the Paris Olympics

Preparations for the Paris Summer Olympics have been going on for years. And given the expected global audience and international participation, cybersecurity is at the center of the action. The post Guarding Gold: Cybersecurity Challenges Ahead ...

Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers stole call, text records of “nearly all” of AT&T’s cellular customers Hackers leveraging stolen Snowflake account credentials ...

USENIX Security ’23 – How Effective is Multiple-Vantage-Point Domain Control Validation?

Authors/Presenters:Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

Advanced Auto Parts: Data of 2.3 Million People Stolen in Breach

Advance Auto Parts, a massive auto parts dealer, says 2.3 million people had their information compromised in a data breach of information stored with cloud storage services provider Snowflake. The post Advanced Auto Parts: Data of 2.3 Million ...

Got Tips?

Dear blog readers, I have a new project which aims to be something in the lines of a final project in the context of that if I can manage to get it going and with success it will mean that I will figure out a decent way to secure my pension and ...

Keeping Your Employees Safe at the 2024 Olympic Games

Practical tips for travel logistics, communication protocols, risk mitigation, and more By Chuck Randolph and Fred Burton As the world eagerly anticipates the 2024 Paris Olympics, the event’s grandeur remains a magnet for threats. Like its ...