Application Security News and Articles


The Team Sport of Cloud Security: Breaking Down the Rules of the Game

Cloud security in 2024 is akin to playing a team sport – it requires clear communication and collaboration between technology vendors and customers. The post The Team Sport of Cloud Security: Breaking Down the Rules of the Game appeared first ...

GUEST ESSAY: How cybercriminals are using ‘infostealers’ to sidestep passwordless authentication

Passwords have been the cornerstone of basic cybersecurity hygiene for decades. Related: Passwordless workpace long way off However, as users engage with more applications across multiple devices, the digital security landscape is shifting from ...

Survey Sees Modern CISOs Becoming More Comfortable With Risk

A survey of 1,031 CISOs finds that cybersecurity leaders are paradoxically getting more comfortable with current levels of risks at a time when CEOs may be finally becoming more cautious. The post Survey Sees Modern CISOs Becoming More ...

How AI helps decode cybercriminal strategies

With terms like “AI washing” making their way into mainstream business consciousness, the hype surrounding AI is making it harder to differentiate between the true applications and empty promises of the technology. The quest for tangible ...

Strengthening cybersecurity preparedness with defense in depth

In this Help Net Security interview, Chaim Mazal, Chief Security Officer at Gigamon, discusses cybersecurity preparedness measures for businesses, the impact of international inconsistencies on global operations, and the board’s role in ...

Travel scams exposed: How to recognize and avoid them

In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign targeting administrative credentials for Booking.com. The attackers create ...

Valuable insights for making the right cybersecurity decisions

This article compiles excerpts from various reports, presenting statistics and insights that could be helpful for CISOs. CISOs becoming more comfortable with risk levels Netskope | The Modern CISO: Bringing Balance | June 2024 ...

Why the Ticketmaster Breach is More Dangerous Than You Think

Learn how the Ticketmaster breach introduces corporate vulnerabilities plus steps to detect company credential usage and safeguard your organization's systems. The post Why the Ticketmaster Breach is More Dangerous Than You Think appeared first ...

A “Meta” Facebook Phish

Found in Environments Protected By: Microsoft By Andrew Mann, Cofense Phishing Defense Center Everyone today has some form of social media, whether it is Instagram, X, YouTube or Facebook. It is an amazing way to communicate and stay connected ...

Threat Hunting in Smart SOAR

In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. ...

How to find PKIX-SSH services on your network

A fork of OpenSSH called PKIX-SSH was impacted by the recently discovered regreSSHion vulnerability. Here's how to find impacted services on your network. The post How to find PKIX-SSH services on your network appeared first on Security Boulevard.

What is the SEC’s Rule on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure?

The U.S. Securities and Exchange Commission (SEC) has issued new rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by public companies, effective December 15, 2023. The post What is the SEC’s Rule on ...

USENIX Security ’23 – Un-Equal Online Safety?” A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns

Authors/Presenters:Kovila P.L. Coopamootoo, Magdalene Ng Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

Google and Apple Move to Strengthen User Protections

Google and Apple look to give users better protections against social engineering attacks like phishing, with Google giving high-risk users access to the APP service with a passkey and Apple educating users about the threats with a detailed ...

SafeBreach Coverage for AA24-190A (APT40)

APT40 is a PRC sponsored threat actor that also goes by several other names including Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk. The post SafeBreach Coverage for AA24-190A (APT40) appeared first on SafeBreach. The post ...

Fortify API yardımı ile Proje Ağacını çekmek, .Net

Fortify, yazılım güvenliğini sağlamaya yönelik etkili bir araç olup, geliştiricilerin kodlarını güvenlik açıkları açısından ...

Microsoft’s July 2024 Patch Tuesday Addresses 4 Zero-Days, 142 Vulnerabilities

Microsoft has released its July 2024 Patch Tuesday security updates, addressing a total of 142 vulnerabilities, including four zero-day vulnerabilities. Notably, two of these zero-days are actively being exploited in the wild, posing significant ...

Randall Munroe’s XKCD ‘Bracket Symbols’

via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bracket Symbols’ appeared first on Security Boulevard.

A Guide to Lockdown of Salesforce Links

Collaboration and cooperation are among the key benefits Salesforce offers its customers. The application’s sharing tools are typical of any cloud-based environment. However, ease of sharing is a two-sided coin, and there is a potential risk ...

DOJ Shutters Massive Russian Bot Farm Spreading Disinformation

The DOJ, FBI, and counterparts in Canada and the Netherlands seized two domains and 968 social media accounts on X that were being used to spread Russian disinformation in the United States and elsewhere. The post DOJ Shutters Massive Russian Bot ...