Application Security News and Articles


MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2

IntroductionThis is Part 2 of our two-part technical deep dive into APT41’s new tooling, DodgeBox and MoonWalk. For details of DodgeBox, go to Part 1.In Part 2 of this blog series, we examine the MoonWalk backdoor, a new addition to APT41's ...

Liquidmatrix Security Digest Podcast – Episode 7C

Episode 0x7C Yup, this is a habit now. It’s all fun and games until somehow you find yourself actually planning and not doing that whole “maybe we will, maybe we won’t” thing. It’s happening. We’re back and making a habit of this! ...

A Comprehensive Guide to the Digital Operational Resilience Act (DORA)

Financial institutions are increasingly more dependent than ever on Information and Communication Technology (ICT). This dependency offers numerous benefits, like increased efficiency and the ability to provide innovative services, but also ...

USENIX Security ’23 – “Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators

Authors/Presenters:Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the ...

MixMode: Revolutionizing Threat Detection and Prioritization in Cybersecurity

Enter MixMode. The MixMode Platform is a cutting-edge cybersecurity solution that is changing the game in threat detection and prioritization. The MixMode Platform offers a powerful alternative to traditional security tools by leveraging advanced ...

Survey Finds Confidence in Data Security Despite Ransomware Scourge

A survey of 322 IT and security professionals finds nearly two-thirds (63%) have confidence in the effectiveness of their organization’s data security measures with another 30% uncertain despite the volume of breaches and ransomware attacks ...

Kanguru’s hardware-based internal SEDs secure data on laptops, tablets, and computers

Kanguru has unveiled its latest security product line aimed at helping organizations safeguard sensitive data on laptops, tablets, and computers. The new hardware-based internal Self-Encrypting Drives (SEDs) are high-performance solid state ...

Eclypsium and Everfox Partner to Deliver Enhanced Security for the Technology Supply Chain of the U.S. Government

Portland, OR – July 11, 2024 – Eclypsium, the leader in digital supply chain security for enterprise hardware, firmware and software infrastructure, today announced a new partnership with Everfox (formerly Forcepoint Federal), a leader in ...

Using Authy? Beware of impending phishing attempts

Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that ...

ScienceLogic enhances AIOps platform to improve security and third-party industry interoperability

ScienceLogic announced a series of key updates to its AIOps platform to deliver enhanced reliability and security, enterprise enablement, third-party integration, improved user experience, and greater support for data center needs. The updates ...

Examining the Decrease in Cyber Insurance Rates

The cyber insurance market has proven tricky for many companies to navigate. The ongoing rise in cyberattacks, coupled with a lack of extensive historical data, makes it difficult to obtain this important insurance at affordable rates.   ...

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals

Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground. With its array of advanced features, ...

Cybersecurity for Blockchain: Protecting Digital Transactions

In an era where digital transactions are becoming the norm, the need for robust cybersecurity mechanisms is more critical than ever. Blockchain technology, known for its decentralized and transparent nature, has revolutionized various industries, ...

Adaptive Shield Partners with Deloitte to DeliverHolistic, Comprehensive SaaS Security for Global Organizations

Implementing SaaS Security with a Powerful Platform and Top-Tier Managed Security Services Adaptive Shield and Deloitte are partnering to help organizations establish a robust SaaS security posture to prevent cybersecurity attacks and data ...

Hard Truths about Remote Access Hardware VPNs

Hardware VPNs are the primary method the enterprise uses to connect remote, or what we now call the hybrid workforce, to the IT tools that power our digital economy. The post Hard Truths about Remote Access Hardware VPNs appeared first on ...

Prompt Security introduces GenAI security solution for MSSPs

Prompt Security announced its product and go-to-market support for Managed Security Service Providers (MSSPs). This strategic initiative has already resulted in partnerships with MSSPs across Europe, the Middle East, North America, and the ...

The Team Sport of Cloud Security: Breaking Down the Rules of the Game

Cloud security in 2024 is akin to playing a team sport – it requires clear communication and collaboration between technology vendors and customers. The post The Team Sport of Cloud Security: Breaking Down the Rules of the Game appeared first ...

GUEST ESSAY: How cybercriminals are using ‘infostealers’ to sidestep passwordless authentication

Passwords have been the cornerstone of basic cybersecurity hygiene for decades. Related: Passwordless workpace long way off However, as users engage with more applications across multiple devices, the digital security landscape is shifting from ...

Survey Sees Modern CISOs Becoming More Comfortable With Risk

A survey of 1,031 CISOs finds that cybersecurity leaders are paradoxically getting more comfortable with current levels of risks at a time when CEOs may be finally becoming more cautious. The post Survey Sees Modern CISOs Becoming More ...

How AI helps decode cybercriminal strategies

With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible ...