Application Security News and Articles


Companies spend more on cybersecurity but struggle to track expenses

Most companies do not know how effectively they are investing money to fight the cybersecurity threat, according to Optiv. Cybersecurity budgets are increasing and cyber incidents are rampant, and yet only a small percentage of respondents have a ...

How do you assess the risk of AI within your operations?

How do you assess the risk of AI within your operations? How do you assess the risk of AI within your operations? Assessing the Risk of AI Within Your Operations Assessing the Risk of AI Within Your Operations Artificial intelligence (AI) has ...

A Brief History of SmokeLoader, Part 2

IntroductionIn this two-part blog series, we explore the evolution of SmokeLoader, a malware downloader that has been active since 2011. In Part 1, we explored early versions of SmokeLoader, from its initial rudimentary framework to its adoption ...

USENIX Security ’23 – Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference

Authors/Presenters:Yun Li, Tsinghua University, Ant Group; Yufei Duan, Tsinghua University; Zhicong Huang, Alibaba Group; Cheng Hong, Ant Group; Chao Zhang and Yifan Song, Tsinghua University Many thanks to USENIX for publishing their ...

Upcoming Book on AI and Democracy

If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce that we’re writing a book on the topic. This isn’t a book about deep fakes, ...

Latest OpenSSH Vulnerability Might Impact 14M Linux Systems

Qualys this week reported the discovery of a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH servers (sshd) that could potentially impact more than 14 million Linux systems. The post Latest OpenSSH Vulnerability Might Impact ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #295 – Agile Consultant Ambitions

“It’s All About the Blazer”, via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé ...

‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE

Tim looks grim: 10 year old vulnerabilities in widely used dev tool include a CVSS 10.0 remote code execution bug. The post ‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE appeared first on Security Boulevard.

Secrets Exposed: The Rise of GitHub as an Attack Vector

A Look at Chariot’s Capability to Protect On June 6, 2024, an anonymous user posted nearly 300 GB of stolen source code to 4chan. Per the user, the leak contained “basically all source code belonging to The New York Times”. The NYT later ...

We’re Asking the Wrong Questions About regreSSHion

... Read more » The post We’re Asking the Wrong Questions About regreSSHion appeared first on Deepfactor. The post We’re Asking the Wrong Questions About regreSSHion appeared first on Security Boulevard.

Weaponizing API discovery metadata

Learn how to weaponize API discovery metadata to improve your recon of the APIs you are hacking or conducting security testing on. The post Weaponizing API discovery metadata appeared first on Dana Epp's Blog. The post Weaponizing API discovery ...

Stormy Skies: Weathering the Threat of Ransomware in the Cloud

Ransomware attacks on cloud environments have surged in the past few years, thanks to the widespread adoption of cloud computing to store backups. A recent survey indicated that almost all (94%) of security professionals have experienced an ...

The Importance of an Up-to-Date Information Security Plan for Automotive OEMs and Dealerships

For OEMs and dealerships, a written information security plan is essential for protecting sensitive data, securing networked vehicle systems, ensuring regulatory compliance and preparing for potential security incidents. But merely having a plan ...

Like Shooting Phish in a Barrel

PHISHING SCHOOL Bypassing Link Crawlers You’ve just convinced a target user to click your link. In doing so, you have achieved the critical step in social engineering: Convincing someone to let you in the door! Now, we just have a few more ...

RSAC Fireside Chat: Amplifier Security taps LLMs to help organizations foster a security culture

Security teams rely on an ever-growing stack of cybersecurity tools to keep their organization safe. Related: The worst year ever for breaches Yet there remains a glaring disconnect between security systems and employees. Now comes a start-up, ...

An Analysis of Kuppinger Cole’s Selection Criteria for API Management and Security

Discover how Escape fits the Kuppinger Cole selection criteria of API Management and Security Solutions. The post An Analysis of Kuppinger Cole’s Selection Criteria for API Management and Security appeared first on Security Boulevard.

Embracing Zero Trust: DoD’s New Cybersecurity Paradigm (Part 1)

In a world where digital infrastructure has no clear boundaries, ensuring robust security is more challenging than ever. Recognizing this, Executive Order 14028 mandates federal agencies to adopt the Zero Trust Model, a revolutionary approach to ...

Deepwatch appoints John DiLullo as CEO

Deepwatch announced that John DiLullo has been appointed as CEO, succeeding Charlie Thomas who is retiring and will serve as chairman of the Board of Directors, effective immediately. John DiLullo is a veteran of the cybersecurity industry with ...

A Deep Dive into the EU Cybersecurity Certification Scheme on Common Criteria (EUCC)

As cyber threats evolve, the European Union has taken significant steps to bolster cybersecurity across its member states. Central to this effort is the European Cybersecurity Certification Scheme on Common Criteria (EUCC), spearheaded by the ...

It’s World UFO Day! Defend Against Unidentified File Objects (UFOs) with Votiro

The post It’s World UFO Day! Defend Against Unidentified File Objects (UFOs) with Votiro appeared first on Votiro. The post It’s World UFO Day! Defend Against Unidentified File Objects (UFOs) with Votiro appeared first on Security Boulevard.