Application Security News and Articles


Continuous Threat Exposure Management for Google Cloud

On July 9th, 2020, an independent security firm discovered a trove of personal health information belonging to Pfizer patients on the public internet. The breach exposed unencrypted conversations between patients and providers of four different ...

Paperclip Maximizers, Artificial Intelligence and Natural Stupidity

Existential risk from AI Some believe an existential risk accompanies the development or emergence of artificial general intelligence (AGI). Quantifying the probability of this risk is a hard problem, to say nothing of calculating the ...

USENIX Security ’23 – Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps

Authors/Presenters:Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, and Min Yang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

Applying Bloch’s Philosophy to Cyber Security

Ernst Bloch, a luminary in the realm of philosophy, introduced a compelling concept known as the “Not-Yet” — a philosophy that envisions the future as a realm of potential and possibility. Bloch’s ideas revolve around the belief that the ...

Week in review: A need for a DDoS response plan, human oversight in AI-enhanced software development

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 4 key steps to building an incident response plan In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses ...

CVE-2024-6387: New OpenSSH RegreSSHion Vulnerability Gives Hackers Root Access on Linux Servers – 700,000+ Linux Boxes Potentially at Risk

Labeled as CVE-2024-6387, the recently discovered vulnerability in OpenSSH has become a serious cause for concern among Linux servers. OpenSSH is a collection of networking tools built on the Secure Shell (SSH) protocol. It is widely utilized to ...

Attack Surface Management: A Free Enablement Technology for Effective Continuous Threat Exposure Management

As digital landscapes continue to evolve daily, organizations are increasingly aware and focused on their attack surfaces to identify and mitigate potential risks. However, a troubling trend has emerged: companies are often compelled to pay bug ...

USENIX Security ’23 – The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications

Authors/Presenters:Simon Koch, Benjamin Altpeter, Martin Johns Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

Researchers Discover Cache of Billion Stolen Passwords

Researchers claim to have uncovered what they claim is the biggest cache of stolen credentials ever found. The post Researchers Discover Cache of Billion Stolen Passwords appeared first on Security Boulevard.

Simplifying Infrastructure Management with Imperva’s Terraform Module for Cloud WAF

In today’s rapidly evolving technological landscape, managing infrastructure efficiently is paramount for businesses striving to stay competitive. With the rise of cloud computing, Infrastructure as Code (IaC) has emerged as a game-changer, ...

The five most common pitfalls of cyber security awareness training

The post The five most common pitfalls of cyber security awareness training appeared first on Click Armor. The post The five most common pitfalls of cyber security awareness training appeared first on Security Boulevard.

USENIX Security ’23 – Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing

Authors/Presenters:Brian Jay Tang, Kang G. Shin Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s ...

How DataDome Detects Puppeteer Extra Stealth

Puppeteer Extra Stealth was designed for bot developers to bypass common security tools. Learn one way DataDome detects Puppeteer Extra Stealth. The post How DataDome Detects Puppeteer Extra Stealth appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Routine Maintenance’

via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Routine Maintenance’ appeared first on Security Boulevard.

‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought

Spackle attack: Chinese company takes over widely used free web service—almost 400,000 websites at risk. The post ‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought appeared first on Security Boulevard.

Extending Modern Identity Protection for Comprehensive Security

TechSpective Podcast Episode 134   There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, etc. ...

Protecting People, Not Just Data

As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I can’t help but feel a sense of unease wash over me. It’s not just another headline or statistic; this time, it’s a bit more personal.  My ...

USENIX Security ’23 – Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones

Authors/Presenters:Daniel Hugenroth, Alastair R. Beresford Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

How to Prepare for the EU’s NIS2 Directive

The Network and Information Systems Directive 2 (NIS2) is sweeping legislation designed to improve the cybersecurity of network and information systems in the European Union (EU). The new directive was released to keep up with an increasingly ...

Why API Discovery is Important for Financial Companies

Discover the role of APIs in the financial sector, and how API discovery ensures security, compliance, and efficiency in financial services. The post Why API Discovery is Important for Financial Companies appeared first on Security Boulevard.