Application Security News and Articles


IoT Vulnerabilities and BotNet Infections: What Executives Need to Know

The Internet of Things (IoT) has revolutionized the way we interact with technology. From smart homes to connected cars, IoT devices have permeated every aspect of our lives. However, the proliferation of these devices has also opened up new ...

Join Cequence Security at Black Hat 2024: Protect What Connects You

Protect What Connects with Cequence Application and API Security Solutions at Black Hat 2024 We are thrilled to announce that Cequence Security will be returning to Black Hat USA 2024 showcasing the latest in API security and bot management ...

We remembered KEVin!

Accelerate CVE searches leveraging new integrations with the CISA and VulnCheck Known Exploited Vulnerabilities lists, as well as EPSS. The post We remembered KEVin! appeared first on Security Boulevard.

Multi-Cloud Security: Proven Methods for Safeguarding Data

As organizations increasingly adopt diverse cloud services to meet their varying computational and storage needs, multi-cloud security emerges as a critical concern. “In 2024, a majority of organizations (78%) are opting for hybrid and ...

Top Cybersecurity Websites and Blogs for Compliance in 2024

In the dynamic realm of compliance, staying abreast of regulatory changes, industry trends, and best practices is a must. To assist compliance professionals in navigating this intricate landscape, we’ve curated a comprehensive list of top cyber ...

Database Penetration Testing: Secure Your Data

Today, organisations store a lot of sensitive data in their database systems. This could be customer info, financial records, intellectual property, etc. Protecting this from unauthorised access is key; database penetration testing helps achieve ...

OWASP Penetration Testing: Methodology, Kit, Checklist (Downloadable)

Software security is key to the online world’s survival. Collaborative efforts of cybersecurity professionals and volunteers have come together to create the OWASP web security testing guide. Malicious actors constantly threaten web ...

Why SPRS Matters and 4 Steps to Improve Your Security Posture

The supplier performance risk system (SPRS) is a database maintained by the DoD that “utilizes suppliers’ performance data in areas of product delivery and quality to rate performance and predict potential risk.” The post Why SPRS Matters ...

Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released

A cryptographic weakness in the DoNex ransomware and its previous incarnations – Muse, fake LockBit 3.0, and DarkRace – has allowed Avast researchers to create a decryptor for files encrypted by all those ransomware variants. DoNex ...

Balancing Security and Convenience with EV Charging

Even as manufacturers tackle convenience issues, the need for digital trust throughout EV infrastructure and ecosystems still remains. The post Balancing Security and Convenience with EV Charging appeared first on Security Boulevard.

Human Vigilance is Required Amid AI-Generated Cybersecurity Threats

While many organizations are adopting AI at an alarming pace to gain efficiencies and lower operating costs through technology and headcount reduction, they may also be sacrificing their security. The post Human Vigilance is Required Amid ...

July 2024 Patch Tuesday forecast: The end of an AV giant in the US

The US celebrated Independence Day last week, providing many with a long weekend leading into patch week. With summer vacations underway, many developers must be out of the office because June was fairly quiet regarding software updates. This ...

How nation-state cyber attacks disrupt public services and undermine citizen trust

In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the impact of nation-state cyber attacks on public sector services and citizens, as well as the broader implications for trust and ...

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police Department’s new ...

Monocle: Open-source LLM for binary analysis search

Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a binary and search criteria (authentication code, vulnerable code, ...

Organizations change recruitment strategies to find cyber talent

An estimated 4 million professionals are needed to fill the growing cybersecurity workforce gap, according to Fortinet. At the same time, Fortinet’s 2024 Global Cybersecurity Skills Gap Report found that 70% of organizations indicated that ...

How Chrome’s Third-Party Cookie Restrictions Affect User Authentication?

Google Chrome has planned to phase out third-party cookies, which will affect different website functionalities depending on third-party cookies. This blog focuses on how this phase-out affects identity and user authentication and discusses ...

Continuous Threat Exposure Management for Google Cloud

On July 9th, 2020, an independent security firm discovered a trove of personal health information belonging to Pfizer patients on the public internet. The breach exposed unencrypted conversations between patients and providers of four different ...

Paperclip Maximizers, Artificial Intelligence and Natural Stupidity

Existential risk from AI Some believe an existential risk accompanies the development or emergence of artificial general intelligence (AGI). Quantifying the probability of this risk is a hard problem, to say nothing of calculating the ...