Application Security News and Articles
On July 9th, 2020, an independent security firm discovered a trove of personal health information belonging to Pfizer patients on the public internet. The breach exposed unencrypted conversations between patients and providers of four different ...
Existential risk from AI
Some believe an existential risk accompanies the development or emergence of artificial general intelligence (AGI). Quantifying the probability of this risk is a hard problem, to say nothing of calculating the ...
Authors/Presenters:Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, and Min Yang
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...
Ernst Bloch, a luminary in the realm of philosophy, introduced a compelling concept known as the “Not-Yet” — a philosophy that envisions the future as a realm of potential and possibility. Bloch’s ideas revolve around the belief that the ...
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 4 key steps to building an incident response plan In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses ...
Labeled as CVE-2024-6387, the recently discovered vulnerability in OpenSSH has become a serious cause for concern among Linux servers. OpenSSH is a collection of networking tools built on the Secure Shell (SSH) protocol. It is widely utilized to ...
As digital landscapes continue to evolve daily, organizations are increasingly aware and focused on their attack surfaces to identify and mitigate potential risks. However, a troubling trend has emerged: companies are often compelled to pay bug ...
Authors/Presenters:Simon Koch, Benjamin Altpeter, Martin Johns
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the ...
Researchers claim to have uncovered what they claim is the biggest cache of stolen credentials ever found.
The post Researchers Discover Cache of Billion Stolen Passwords appeared first on Security Boulevard.
In today’s rapidly evolving technological landscape, managing infrastructure efficiently is paramount for businesses striving to stay competitive. With the rise of cloud computing, Infrastructure as Code (IaC) has emerged as a game-changer, ...
The post The five most common pitfalls of cyber security awareness training appeared first on Click Armor.
The post The five most common pitfalls of cyber security awareness training appeared first on Security Boulevard.
Authors/Presenters:Brian Jay Tang, Kang G. Shin
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the conference’s ...
Puppeteer Extra Stealth was designed for bot developers to bypass common security tools. Learn one way DataDome detects Puppeteer Extra Stealth.
The post How DataDome Detects Puppeteer Extra Stealth appeared first on Security Boulevard.
via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD
Permalink
The post Randall Munroe’s XKCD ‘Routine Maintenance’ appeared first on Security Boulevard.
Spackle attack: Chinese company takes over widely used free web service—almost 400,000 websites at risk.
The post ‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought appeared first on Security Boulevard.
TechSpective Podcast Episode 134 There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, etc. ...
As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I can’t help but feel a sense of unease wash over me. It’s not just another headline or statistic; this time, it’s a bit more personal. My ...
Authors/Presenters:Daniel Hugenroth, Alastair R. Beresford
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.
Originating from the ...
The Network and Information Systems Directive 2 (NIS2) is sweeping legislation designed to improve the cybersecurity of network and information systems in the European Union (EU). The new directive was released to keep up with an increasingly ...
Discover the role of APIs in the financial sector, and how API discovery ensures security, compliance, and efficiency in financial services.
The post Why API Discovery is Important for Financial Companies appeared first on Security Boulevard.