Application Security News and Articles
IntroductionThis is Part 2 of our two-part technical deep dive into APT41’s new tooling, DodgeBox and MoonWalk. For details of DodgeBox, go to Part 1.In Part 2 of this blog series, we examine the MoonWalk backdoor, a new addition to APT41's ...
Episode 0x7C Yup, this is a habit now. It’s all fun and games until somehow you find yourself actually planning and not doing that whole “maybe we will, maybe we won’t” thing. It’s happening. We’re back and making a habit of this! ...
Financial institutions are increasingly more dependent than ever on Information and Communication Technology (ICT). This dependency offers numerous benefits, like increased efficiency and the ability to provide innovative services, but also ...
Authors/Presenters:Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the ...
Enter MixMode. The MixMode Platform is a cutting-edge cybersecurity solution that is changing the game in threat detection and prioritization. The MixMode Platform offers a powerful alternative to traditional security tools by leveraging advanced ...
A survey of 322 IT and security professionals finds nearly two-thirds (63%) have confidence in the effectiveness of their organization’s data security measures with another 30% uncertain despite the volume of breaches and ransomware attacks ...
Kanguru has unveiled its latest security product line aimed at helping organizations safeguard sensitive data on laptops, tablets, and computers. The new hardware-based internal Self-Encrypting Drives (SEDs) are high-performance solid state ...
Portland, OR – July 11, 2024 – Eclypsium, the leader in digital supply chain security for enterprise hardware, firmware and software infrastructure, today announced a new partnership with Everfox (formerly Forcepoint Federal), a leader in ...
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that ...
ScienceLogic announced a series of key updates to its AIOps platform to deliver enhanced reliability and security, enterprise enablement, third-party integration, improved user experience, and greater support for data center needs. The updates ...
The cyber insurance market has proven tricky for many companies to navigate. The ongoing rise in cyberattacks, coupled with a lack of extensive historical data, makes it difficult to obtain this important insurance at affordable rates. ...
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground. With its array of advanced features, ...
In an era where digital transactions are becoming the norm, the need for robust cybersecurity mechanisms is more critical than ever. Blockchain technology, known for its decentralized and transparent nature, has revolutionized various industries, ...
Implementing SaaS Security with a Powerful Platform and Top-Tier Managed Security Services Adaptive Shield and Deloitte are partnering to help organizations establish a robust SaaS security posture to prevent cybersecurity attacks and data ...
Hardware VPNs are the primary method the enterprise uses to connect remote, or what we now call the hybrid workforce, to the IT tools that power our digital economy.
The post Hard Truths about Remote Access Hardware VPNs appeared first on ...
Prompt Security announced its product and go-to-market support for Managed Security Service Providers (MSSPs). This strategic initiative has already resulted in partnerships with MSSPs across Europe, the Middle East, North America, and the ...
Cloud security in 2024 is akin to playing a team sport – it requires clear communication and collaboration between technology vendors and customers.
The post The Team Sport of Cloud Security: Breaking Down the Rules of the Game appeared first ...
Passwords have been the cornerstone of basic cybersecurity hygiene for decades.
Related: Passwordless workpace long way off
However, as users engage with more applications across multiple devices, the digital security landscape is shifting from ...
A survey of 1,031 CISOs finds that cybersecurity leaders are paradoxically getting more comfortable with current levels of risks at a time when CEOs may be finally becoming more cautious.
The post Survey Sees Modern CISOs Becoming More ...
With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible ...