Application Security News and Articles


Randall Munroe’s XKCD ‘Routine Maintenance’

via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Routine Maintenance’ appeared first on Security Boulevard.

‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought

Spackle attack: Chinese company takes over widely used free web service—almost 400,000 websites at risk. The post ‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought appeared first on Security Boulevard.

Extending Modern Identity Protection for Comprehensive Security

TechSpective Podcast Episode 134   There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, etc. ...

Protecting People, Not Just Data

As I sit here, reflecting on the recent news of the ransomware attack on pathology lab Synnovis, I can’t help but feel a sense of unease wash over me. It’s not just another headline or statistic; this time, it’s a bit more personal.  My ...

USENIX Security ’23 – Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones

Authors/Presenters:Daniel Hugenroth, Alastair R. Beresford Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

How to Prepare for the EU’s NIS2 Directive

The Network and Information Systems Directive 2 (NIS2) is sweeping legislation designed to improve the cybersecurity of network and information systems in the European Union (EU). The new directive was released to keep up with an increasingly ...

Why API Discovery is Important for Financial Companies

Discover the role of APIs in the financial sector, and how API discovery ensures security, compliance, and efficiency in financial services. The post Why API Discovery is Important for Financial Companies appeared first on Security Boulevard.

Twilio’s Authy Breach: The Attack via an Unsecured API Endpoint

A recap of Twilio's Authy app breach, which exposed 33 million phone numbers. Including the impacts, lessons learnt and recommendations to enhance your security. The post Twilio’s Authy Breach: The Attack via an Unsecured API Endpoint ...

The Pros and Cons of Secure Access Service Edge (SASE)

Software-Defined Wide Area Network (SD-WAN) manages and optimizes the delivery of network services across multiple locations. Secure Web Gateway (SWG) protects users from web-based threats by filtering malicious content, including malware, ...

Extending the Reach and Capabilities of Digital Signing With Standards

Digital signatures are ideal for addressing today’s challenges, providing the robust security, flexibility and scalability that organizations require for a wide range of use cases. The post Extending the Reach and Capabilities of Digital ...

Fickle Malware Leads to UAC Bypass and Data Exfiltration

A new Rust-based malware called Fickle Stealer has emerged, targeting sensitive information through multiple attack vectors. Fortinet FortiGuard Labs reports that Fickle malware is distributed via four main methods: VBA dropper, VBA downloader, ...

Understanding API Key Verification

As organizations look to improve their API security, two distinct approaches to API key verification have emerged — centralized and decentralized verification. The post Understanding API Key Verification appeared first on Security Boulevard.

Smashing Silos With a Vulnerability Operations Center (VOC)

VOC enables teams to address the vulnerabilities that present the greatest risk to their specific attack surface before they can be exploited. The post Smashing Silos With a Vulnerability Operations Center (VOC) appeared first on Security Boulevard.

Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of ‘traditional’ banking malware or, more recently, cryptostealers, ...

99% of IoT exploitation attempts rely on previously known CVEs

The explosion of Internet of Things (IoT) devices has brought about a wide range of security and privacy challenges, according to Bitdefender and NETGEAR. The report is based on global telemetry of 3.8 million homes and 50 million IoT devices ...

47% of corporate data stored in the cloud is sensitive

As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited ...

Organizations weigh the risks and rewards of using AI

78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk assessment The report, based on a survey of over 400 security ...

New infosec products of the week: July 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from LogRhythm, NordVPN, Regula, and Scythe. LogRhythm’s enhancements boost analyst efficiency This quarter, LogRhythm is highlighting its Machine Data ...

The Runtime Secrets’ Security Gap

The last mile in secrets security is securing secrets in workloads. Discover a new way to securely deliver encrypted secrets in your infrastructure with innovative open-source tools, and say goodbye to plaintext secrets. The post The Runtime ...

Upskill, Reskill, or Hire? For GenAI, You Need All Three

The buzz around AI is palpable! The need for new skills and the rush to create AI-powered teams grows stronger – the whispers of Gen...Read More The post Upskill, Reskill, or Hire? For GenAI, You Need All Three appeared first on ISHIR | ...