Application Security News and Articles


BTS #33 – Securing OT Environments – Dr. Ed Harris

Ed Harris joins us to discuss how to secure OT environments, implement effective air gaps, and more! Show Notes The post BTS #33 - Securing OT Environments - Dr. Ed Harris appeared first on Eclypsium | Supply Chain Security for the Modern ...

Stop Ransomware in its Tracks: Suspicious File Activity

The Threat Scenario Consider a scenario where your file server, “D3Cyber-FileServer,” triggers an alert. The alert indicates an encryption attempt on “important_document.docx” by the command-line tool “cmd.exe.” This activity could ...

Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the highly sophisticated Russian adversary Sandworm during various destructive activities against targets in Ukraine and other countries in the region shortly ...

USENIX Security ’23 – Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications

Authors/Presenters:Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

CVE of the month, the supply chain attack hidden for 10 years CVE-2024-38368

For over a decade, a massive vulnerability that could have unleashed a huge supply chain attack lay dormant. Luckily the good guys found it first or so it seems. This month we are taking a look at CVE-2024-38368. The post CVE of the month, the ...

Threat Hunting Workshop 11: Hunting for Command and Control

Get ready to elevate your threat hunting skills with Intel 471’s exhilarating and interactive workshop, focusing on the pivotal MITRE ATT&CK Tactic: Command and Control! This isn’t just another workshop; it’s an opportunity to immerse ...

Randall Munroe’s XKCD ‘Bad Map Projection: Exterior Kansas’

via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bad Map Projection: Exterior Kansas’ appeared first on Security Boulevard.

You’re Telling Me That Ad Was Fake? Malvertising Is Sneakier Than Ever | Avast

Finding a space online that’s not rife with ads seems like an unlikely dream—unless you pay for it. And depending on the platform, you may think that the ads you see are legitimate. However, that may not be the case. The post You’re Telling ...

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have adjusted their security strategy this year. These changes are primarily ...

New Open SSH Vulnerability

It’s a serious one: The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. ...

USENIX Security ’23 – TVA: A Multi-Party Computation System For Secure And Expressive Time Series Analytics

Authors/Presenters:Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

RegreSSHion CVE-2024-6387: A Targeted Exploit in the Wild  

A critical security flaw, known as regression and cataloged under CVE-2024-6387, has been identified in OpenSSH, just a few days ago. This vulnerability allows an unauthenticated attacker to execute arbitrary code and potentially obtain root ...

Data Breaches in June 2024 – Infographic

Have you ever gotten that sinking feeling that your personal information might be out in the open? At WeSecureApp we monitor several major breaches that occurred this month, exposing a wide range of data from financial information to phone ...

Survey Surfaces Growing Lack of Cybersecurity Confidence

A survey of 706 IT and security professionals finds half are not very confident that they can stop a damaging security incident in the next 12 months, with 30% admitting they are less prepared to detect threats and respond to incidents than they ...

Man-In-The-Middle Attacks are Still a Serious Security Threat

Man-in-the-middle attacks have increased in the age of digital connectivity and remote work, forcing companies to develop strategies to mitigate them. The post Man-In-The-Middle Attacks are Still a Serious Security Threat appeared first on ...

How to Achieve Crypto Resilience for a Post-Quantum World

While it's unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be. The post How to Achieve Crypto Resilience for a Post-Quantum World appeared first on Security Boulevard.

Regula Forensic Studio updates improve the accuracy of forensic examinations

Regula has released a significant update to its operating software, Regula Forensic Studio. This major revamp enhances the functionality of forensic devices, improves usability, streamlines operations, and allows for more precise document ...

The Secret Threat Hiding in Your SaaS Stack: Shadow IT

While SaaS apps enable better business operations, a secret threat is hiding in your SaaS stack: "Shadow IT.” The post The Secret Threat Hiding in Your SaaS Stack: Shadow IT appeared first on Security Boulevard.

The Role of Automation in Enforcing the Principle of Least Privilege

As businesses continue to expand their reliance on cloud security and privileged access management, the imperative to implement least privilege access in a manner both effective and efficient cannot be overstated. Yet, with the increasing ...

Boardroom Blindspot: How New Frameworks for Cyber Metrics are Reshaping Boardroom Conversations

With new frameworks for cyber metrics and reporting being implemented globally, regulators have effectively elevated risk to the same level of board awareness as financial risks. The post Boardroom Blindspot: How New Frameworks for Cyber Metrics ...