Application Security News and Articles


Align strengthens defense against double-extortion ransomware tactics

Align adds a new exfiltration prevention feature to its Align Guardian Managed Detection and Response offering, powered by Adlumin. This innovation is designed to detect and stop attackers from exfiltrating data, providing a defense against ...

RSAC Fireside Chat: Madison Horn’s quest to add cyber expertise, restore ethics to Congress

At a time of devolving politics, Madison Horn stands out as a breath of fresh air. Related: The Biden-Harris National Cybsecurity Strategy I had the chance to sit down with Horn at RSAC 2024 to learn all about her measured … (more…) The post ...

Outpost24 appoints Ido Erlichman as CEO

Outpost24 announced the appointment of Ido Erlichman as its new CEO, effective immediately. With over 20 years of experience in cyber security, technology and finance, Erlichman will bring a wealth of knowledge and a proven track record of ...

Unleashing the Power of Next-Gen Agents for Robust Cloud-Native Security

While there’s no one-size-fits-all option for securing the cloud, next-generation agents thrive in these fast-moving environments and serve as the critical component of any cloud security strategy. The post Unleashing the Power of Next-Gen ...

LockBit 3.0: The Rising Costs of Ransomware Attacks

Ransomware attacks have become increasingly sophisticated and costly, with LockBit 3.0 emerging as a formidable adversary. This latest iteration of ransomware is not just a technical challenge but a financial nightmare, costing businesses ...

Navigating Authentication Challenges: A Closer Look at Contemporary CIAM

The need for robust authentication mechanisms has become paramount in the ever-evolving landscape of digital security. The post Navigating Authentication Challenges: A Closer Look at Contemporary CIAM appeared first on Security Boulevard.

Minimize Data Breaches with Planning, Transparency and Technology

Data breaches are growing more prevalent and sophisticated, and companies must make every effort to minimize the impact of an attack. The post Minimize Data Breaches with Planning, Transparency and Technology appeared first on Security Boulevard.

Microsoft’s cybersecurity dilemma: An open letter to Satya Nadella

Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of cybersecurity issues with Microsoft products and services. Over the past several years, Microsoft has ...

Exploring the root causes of the cybersecurity skills gap

In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the need for diverse talent and continuous upskilling in areas like AI and cloud ...

Shadow engineering exposed: Addressing the risks of unauthorized engineering practices

Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff Research Engineer at Endor Labs, discusses why it causes issues and how it ...

Level Up Your ATO Defenses: Account Protect Delivers Advanced Threat Detection

Account fraud is a growing problem, with fraudsters bypassing traditional security measures with ease. Learn how Account Protect identifies sophisticated fraud with ease. The post Level Up Your ATO Defenses: Account Protect Delivers Advanced ...

Understanding CMMC Level 2 (Advanced)

The Cybersecurity Maturity Model Certification (CMMC) is a crucial program for defense contractors. CMMC Level 2, referred to as Advanced, applies to the 80,000 organizations that handle Controlled Unclassified Information (CUI). It aligns with ...

Mastering Efficient Data Processing for LLMs, Generative AI, and Semantic Search

Discover cutting-edge techniques for optimizing data processing in LLMs, generative AI, and semantic search. Learn to leverage vector databases, implement data compression, utilize parallelization, and employ strategic caching The post Mastering ...

USENIX Security ’23 – Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js

Authors/Presenters:Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Análise de Vulnerabilidades: SAST, DAST e SCA

A segurança de software é um aspecto crucial do desenvolvimento moderno, garantindo que aplicações estejam protegidas contra ameaças e…Continue reading on Medium »

TeamViewer: Network segmentation hobbled Midnight Blizzard’s attack

TeamViewer, the company developing the popular remote access/control software with the same name, has finished the investigation into the breach it detected in late June 2024, and has confirmed that it was limited to their internal corporate IT ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #296 – ROTI

“It’s All About the Blazer”, via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé ...

USENIX Security ’23 – Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems

Authors/Presenters:Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to ...

Scytale Joins AWS ISV Accelerate Program

Scytale joins the AWS ISV Accelerate Program to enhance its cloud compliance solutions with better performance and reliability. The post Scytale Joins AWS ISV Accelerate Program appeared first on Scytale. The post Scytale Joins AWS ISV Accelerate ...

What You Need to Know About the EU Cyber Resilience Act

Understand what the CRA entails and how to comply.    The post What You Need to Know About the EU Cyber Resilience Act appeared first on Security Boulevard.