Application Security News and Articles


Product updates: Automated schema generation

We are excited to introduce our latest feature: automated schema generation for all your discovered APIs. The post Product updates: Automated schema generation appeared first on Security Boulevard.

Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action

How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how and ...

RockYou2024

RockYou2024 password list boasts over 9.9 billion raw lines. This dictionary demonstrates the continued relevance of stolen user credentials. The post RockYou2024 appeared first on Security Boulevard.

3 Ways to Achieve Zero-Trust With Your PAM Strategy

Three crucial ways to achieve zero-trust through your PAM strategy, ensuring that every privileged user session within your IT environment is safe by design. The post 3 Ways to Achieve Zero-Trust With Your PAM Strategy appeared first on Security ...

Securing Kubernetes: The Risks Of Unmanaged Machine Identities

Microservices and containers are changing the way businesses build, deploy, and manage their applications. Within a short span, these technologies have become the de facto standard for software development and distribution. Kubernetes, the ...

Google removes enrollment barrier for prospective Advanced Protection Program users

Google has removed a potential obstacle for high-risk users who want to enroll in the company’s Advanced Protection Program (APP): they can now do it just by setting a passkey. Users already enrolled in APP have been provided the option to ...

Deepfake Threats and Biometric Security Vulnerabilities

Grasping how biometric attacks work is crucial for organizations to make informed decisions based on actual threat intelligence. The post Deepfake Threats and Biometric Security Vulnerabilities appeared first on Security Boulevard.

Mirantis OpenStack for Kubernetes 24.2 automates workload distribution

Mirantis announced Mirantis OpenStack for Kubernetes (MOSK) 24.2 with an exclusive dynamic resource balancer feature that automates workload distribution to solve hotspot and “noisy neighbor” problems. Now, MOSK automatically redistributes ...

Command Zero emerges from stealth with $21 Million in seed funding

Command Zero emerged from stealth with $21 Million in seed funding, led by Andreessen Horowitz with participation from Insight Partners and over 60 cyber industry thought leaders and executives. Using encoded expert knowledge, automation and ...

Beyond Checklists: The Rise of Automated Vendor Assessment and Enhanced Security

As cyberthreats continue to increase, automation and proactive measures will be essential for mitigating the risks associated with third-party relationships and safeguarding valuable data and infrastructure. The post Beyond Checklists: The Rise ...

Enzoic Global Partner Program helps combat dark web exposures

Enzoic has unveiled its Enzoic Global Partner Program to help organizations strengthen their security posture in response to the evolving cybersecurity landscape. Participants have access to Enzoic’s award-winning threat intelligence solutions ...

Polyfill.io Supply Chain Attack: Malicious JavaScript Injection Puts Over 100k Websites At Risk

Polyfill.io helps web developers achieve cross-browser compatibility by automatically managing necessary polyfills. By adding a script tag to their HTML, developers can ensure that features like JavaScript functions, HTML5 elements, and various ...

Diversifying cyber teams to tackle complex threats

Technologies such as GenAI, ML and IoT are giving threat actors new tools that make it easier to target consumers and organizations. From Savvy Seahorse which lures victims into investment scams, to a self-replicating AI worm that uses the likes ...

How companies increase risk exposure with rushed LLM deployments

In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and vulnerabilities as they rush to deploy LLMs. King explains how LLMs pose ...

BunkerWeb: Open-source Web Application Firewall (WAF)

BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and the community. “The genesis of BunkerWeb comes from the ...

Lessons Learned From Exposing Unusual XSS Vulnerabilities

Misunderstood browser APIs are often at the core of many web security issues. With the rapid expansion of web APIs, keeping up with security best practices can be challenging. In this post, we’ll explore a few common mistakes developers make ...

Cybersecurity jobs available right now: July 10, 2024

CISO HoneyBook | Israel | On-site – View job details As a CISO, you will develop and implement a multi-year security strategy and roadmap to anticipate and address security challenges in alignment with company growth objectives. ...

73% of security pros use unauthorized SaaS applications

73% of security professionals admit to using SaaS applications that had not been provided by their company’s IT team in the past year, according to Next DLP. Unauthorized tool use poses major risks for organizations This is despite the fact ...

Emerging Technology Highlights New Converged Risks and Asymmetric Threats

Protecting high-profile individuals and events as the digital threat landscape evolves This article was originally posted in ASIS Security Management Magazine. The ubiquity of technology companies in daily life today puts them in the security ...

Patch Tuesday Update – July 2024

The post Patch Tuesday Update - July 2024 appeared first on Digital Defense. The post Patch Tuesday Update – July 2024 appeared first on Security Boulevard.