Application Security News and Articles


Illuminating the Shadows: Insights from Cybersecurity Experts on Navigating the Dark Web

The dark web – that hidden underbelly of the internet where cybercriminals buy, sell and trade illicit goods and stolen data. It’s a murky realm that poses a significant threat to businesses and individuals alike. We sat down with dark web ...

Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack

A new critical security vulnerability in the RADIUS protocol, dubbed BlastRADIUS, leaves most networking equipment open to Man-in-the-Middle (MitM) attacks. While the vulnerability can be difficult to exploit, the possible impact of an exploit is ...

Cybersecurity Checklist: Preparing Your Devices for Summer Travel

Summer is here, and it’s time for that much-awaited vacation. But while you’re packing your bags and planning your itinerary, there’s one thing you shouldn’t overlook – the security of your digital devices. Understanding the ...

Chinese APT40 group swifly leverages public PoC exploits

Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software, an advisory released by intelligence and cybersecurity agencies from eight countries ...

The American Privacy Rights Act: What You Need to Know

The American Privacy Rights Act (APRA) has recently taken a significant step forward in the U.S. legislative process. But wait! Don’t get your pAPRty hats out just yet; it’s just the beginning of a long journey. What is the American Privacy ...

Research: Only 61% of top manufacturers have adopted DMARC despite rising cyber attacks

A new study by EasyDMARC has revealed that ... The post Research: Only 61% of top manufacturers have adopted DMARC despite rising cyber attacks appeared first on EasyDMARC. The post Research: Only 61% of top manufacturers have adopted DMARC ...

How to Add Cloudflare DMARC, SPF, and DKIM Records? Easy Setup Guide

Reading Time: 5 min Learn how to add and manage DMARC, SPF, and DKIM records in Cloudflare to enhance your email security. Follow our easy step-by-step setup. The post How to Add Cloudflare DMARC, SPF, and DKIM Records? Easy Setup Guide appeared ...

Stellar Cyber Open XDR platform now supports BYODL

Stellar Cyber announced that the Stellar Cyber Open XDR platform now supports “Bring Your Own Data Lake” (BYODL). This seamless integration allows organizations that have standardized their data storage framework on Splunk, Snowflake, ...

Egnyte Copilot accelerates enterprise content collaboration

Egnyte launched Egnyte Copilot, its AI-driven assistant designed to accelerate and transform enterprise content collaboration. Egnyte Copilot enables Egnyte customers to start engaging in AI-powered conversations with their own private and ...

Staying Safe During Amazon Prime Day 

As you can see in the above screenshot, Apple iPads are one of the lovable items scammers are purchasing with the stolen credentials and gift cards. In parallel, in another forum, as part of “contributing the community”, one of the hackers ...

Align strengthens defense against double-extortion ransomware tactics

Align adds a new exfiltration prevention feature to its Align Guardian Managed Detection and Response offering, powered by Adlumin. This innovation is designed to detect and stop attackers from exfiltrating data, providing a defense against ...

RSAC Fireside Chat: Madison Horn’s quest to add cyber expertise, restore ethics to Congress

At a time of devolving politics, Madison Horn stands out as a breath of fresh air. Related: The Biden-Harris National Cybsecurity Strategy I had the chance to sit down with Horn at RSAC 2024 to learn all about her measured … (more…) The post ...

Outpost24 appoints Ido Erlichman as CEO

Outpost24 announced the appointment of Ido Erlichman as its new CEO, effective immediately. With over 20 years of experience in cyber security, technology and finance, Erlichman will bring a wealth of knowledge and a proven track record of ...

Unleashing the Power of Next-Gen Agents for Robust Cloud-Native Security

While there’s no one-size-fits-all option for securing the cloud, next-generation agents thrive in these fast-moving environments and serve as the critical component of any cloud security strategy. The post Unleashing the Power of Next-Gen ...

LockBit 3.0: The Rising Costs of Ransomware Attacks

Ransomware attacks have become increasingly sophisticated and costly, with LockBit 3.0 emerging as a formidable adversary. This latest iteration of ransomware is not just a technical challenge but a financial nightmare, costing businesses ...

Navigating Authentication Challenges: A Closer Look at Contemporary CIAM

The need for robust authentication mechanisms has become paramount in the ever-evolving landscape of digital security. The post Navigating Authentication Challenges: A Closer Look at Contemporary CIAM appeared first on Security Boulevard.

Minimize Data Breaches with Planning, Transparency and Technology

Data breaches are growing more prevalent and sophisticated, and companies must make every effort to minimize the impact of an attack. The post Minimize Data Breaches with Planning, Transparency and Technology appeared first on Security Boulevard.

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past several years, Microsoft has ...

Exploring the root causes of the cybersecurity skills gap

In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for diverse talent and continuous upskilling in areas like AI and cloud ...

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how it ...