Application Security News and Articles


USENIX Security ’23 – One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles

Authors/Presenters:Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

Randall Munroe’s XKCD ‘Pole Vault’

via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Pole Vault’ appeared first on Security Boulevard.

Dependency Management: Protecting Your Code

Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates. The post Dependency Management: Protecting Your Code appeared first on Security Boulevard.

USENIX Security ’23 – Problematic Advertising and its Disparate Exposure on Facebook

Authors/Presenters: Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski, Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

Addressing Financial Organizations’ Digital Demands While Avoiding Cyberthreats

Financial firms should explore how the vast array of SASE services can improve the services they offer while providing unparalleled security for the network. The post Addressing Financial Organizations’ Digital Demands While Avoiding ...

AppViewX Integration with Intune for Certificate Automation

Microsoft Intune is a cloud-based Mobile device management (MDM) solution that helps organizations manage devices, including mobile devices, tablets, and laptops. In addition to standardizing endpoint configurations, it is responsible for ...

Zero-Trust Strategies: Paving the Way for a Secure Future & Sustainable Enterprise Growth

Explore the importance of zero-trust in safeguarding sensitive information, enhancing organizational visibility, and ensuring a secure and seamless user experience. The post Zero-Trust Strategies: Paving the Way for a Secure Future & ...

Fix Your Code, Track the Remediation

Enhance your secrets remediation process with GitGuardian’s new features: pinpoint the locations needing code fixes and track the progress in real time. Discover how these tools can boost efficiency, enhance collaboration, and shorten ...

What is NIST Compliance? A Guide to NIST Standards, Framework & Controls

Data protection is a top concern for businesses both large and small, and that’s where NIST comes in. NIST, orRead More The post What is NIST Compliance? A Guide to NIST Standards, Framework & Controls appeared first on Kaseya. The post ...

AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again

Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them. The post AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again appeared first on Security Boulevard.

Q-Day Prepping: What Businesses Can Do Now to Address Quantum Security Risks

We're primed to face another Y2K-like event: Q-Day, the point at which quantum computers become capable of breaking traditional encryption, totally upending security as we know it. The post Q-Day Prepping: What Businesses Can Do Now to Address ...

Musk’s Voice, Likeness Used in Deepfake Scam Targeting the Olympics

Threat actors targeting the upcoming Paris Olympics release a three-part video series called "Olympics Has Fallen II" and use AI-generated deepfake technology to make it appear that Tesla CEO Elon Musk is narrating the story. The post Musk’s ...

Hackers stole call, text records of “nearly all” of AT&T’s cellular customers

Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to October 2022, the company has confirmed. “The data does not ...

Info of 2,3+ million individuals stolen in Advance Auto Parts data breach

Personal information of over 2,3 million individuals has been stolen by attackers as part of the massive data grab via compromised Snowflake accounts without MFA protection, Advance Auto Parts has confirmed by filing notices with the attorney ...

Gathid identity governance platform enhancements help identify access changes

Gathid announced the release of Version 1.14.0 of its identity governance platform. This latest update introduces new comprehensive export capabilities that enable users to seamlessly establish an identity baseline in minutes with a complete view ...

GitLab Authentication Bypass Vulnerability (CVE-2024-6385) Notification

Overview Recently, NSFOCUS CERT detected that GitLab issued a security announcement and fixed the identity bypass vulnerability (CVE-2024-6385) in GitLab Community Edition (CE) and Enterprise Edition (EE). Due to the incomplete fixing of ...

6 Steps to Build an Incident Response Workflow for Your Business

From data breaches to malware infections, cyber threats are numerous and ever-evolving. Having a robust incident response workflow is your shield against increasingly sophisticated cyber threats. Live patching can be a valuable tool in your ...

Forcepoint promotes Ryan Windham to CEO

Forcepoint announced the promotion of Ryan Windham, Chief Customer and Strategy Officer, to Chief Executive Officer (CEO), succeeding Manny Rivelo, who is retiring from his position as CEO of the company. These transitions will be effective ...

Microsoft’s Security Update in July of High-Risk Vulnerabilities in Multiple Products

Overview On July 10, NSFOCUS CERT detected that Microsoft released a security update patch for July, which fixed 139 security issues involving Windows, Microsoft SQL Server, Microsoft Office, Azure and other widely used products, including ...

Understanding The 5 Pillars of Certificate Lifecycle Management

Certificate Lifecycle Management (CLM) involves discovering, issuing, renewing, and revoking digital certificates, crucial for enterprise cybersecurity. Key pillars: Discover, Deploy, Revoke and Replace, Renew, Integration. The post Understanding ...