Application Security News and Articles


H1 SCA Roundup – Defending Users Against Constantly Evolving Cyber Threats

Learn more about GitGuardian SCA commitment and fast adaptation strategies to safeguard the software supply chain of its users. The post H1 SCA Roundup – Defending Users Against Constantly Evolving Cyber Threats appeared first on Security ...

The Evolution of WAF and RASP | Impart Security

Rami McCarthy did a great post last month touching on some of the history of RASP.  I thought the post was great and did a great job focusing on the competitive landscape, industry factors, and technical barriers to entry.  In this post, I ...

LOKKER introduces web privacy risk summary for insurers

LOKKER released a new privacy solution for insurers: the ability to share on-demand web privacy risk reports with their insureds. These reports give insurers and the insured companies a simple view of their data privacy risk profile in eight ...

Strata Identity Continuity prevents mission-critical applications from going offline

Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity and uninterrupted application access by seamlessly failing over from a primary cloud ...

AppViewX AVX ONE CLM – Managing Java TrustStore with Google Cloud Platform

Google Cloud Storage is a highly scalable, secure, and durable object storage service designed to handle vast amounts of data for a wide range of applications. As part of the Google Cloud Platform, it offers robust infrastructure and seamless ...

Ketch No-Code Rights Automation empowers non-technical teams to manage DSR requests

Ketch launched its No-Code Rights Automation product, designed to make it easy for non-technical teams to comply with consumer requests for data deletion and access. This includes the full business process from receiving the consumer request, to ...

Strata Identity Announces General Availability of Identity Continuity for Zero Application Downtime During IDP Outages

PRESS RELEASE Now available as part of the Maverics Identity Orchestration platform, Strata’s Identity Continuity eliminates business risk with seamless failover from cloud to on-premises IDPs BOULDER, Colo., July 23, 2024 – Strata Identity, ...

SCW Trust Agent measures developers’ security competencies for code commits

Secure Code Warrior introduced SCW Trust Agent – a solution that assesses the specific security competencies of developers for every code commit. This innovative offering enables CISOs and application security (AppSec) teams to embrace a ...

Introducing Identity Continuity™: Uninterrupted access and security in an always-on world

Uninterrupted access to applications and data is critical in the modern business world. When identity providers (IDPs) aren’t available, neither are your applications. The impact can be severe — financial losses, reputational damage, and ...

Four Automated Anti-Phishing Techniques

The post Four Automated Anti-Phishing Techniques appeared first on AI-enhanced Security Automation. The post Four Automated Anti-Phishing Techniques appeared first on Security Boulevard.

Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their Defenses 

The management of vendor and third-party risks is emerging as the number one challenge among U.S. information security professionals. The post Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their ...

Wiz Walks Away From $23 Billion Google Bid

Cloud security startup Wiz reportedly is rejecting Google's $23 billion acquisition bid, with the CEO saying the Israeli company will now focus on going public and reach the point of having $1 billion in recurring revenue. The post Wiz Walks Away ...

Social Media and Travel: Be Careful of What You Share

Social media has become an integral part of our daily lives. It allows us to share our experiences, connect with friends and family, and document our travels. However, this convenience comes with a price. The information we share can alert ...

The changes in the cyber threat landscape in the last 12 months

When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat ...

CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber attacks. ...

Vulnerability in Telegram app for Android allows sending malicious files disguised as videos

ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from June 2024. Example of how the EvilVideo exploit appears on Telegram ...

CISA and FBI Issue Alert on OS Command Injection Vulnerabilities

CISA and FBI issued a critical advisory on July 10, 2024, urging software companies to review their products and eliminate OS command injection vulnerabilities at the source. This urgent call comes in the wake of recent attacks that exploited ...

Rezonate Streamlines Identity Security Across IT Environments

Rezonate has extended the reach of its platform for managing access to infrastructure to include the credentials that are used by humans alongside the identifies of machines and software components that organizations need to track to ensure ...

Gcore raises $60 million to drive AI innovation

Gcore has secured $60 million in Series A funding from institutional and strategic investors. Led by Wargaming, and with participation from Constructor Capital and Han River Partners, this marks the company’s first external capital raise since ...

TuxCare Answers Urgent Needs for Enterprises Facing Spring Framework End of Life

PALO ALTO, Calif. – July XX, 2024 – TuxCare, a global innovator in cybersecurity for Linux, today announced that its new Extended Lifecycle Support for Spring powered by TuxCare’s SecureChain for Java will become available to customers on ...