Application Security News and Articles


How to Set Up SonarQube on AWS Cloud in Minutes with AWS CDK

AWS CDK serving Sonarqube on AWS EC2 instance😎Continue reading on AWS in Plain English »

CodeSecDays 2024: A Deep Dive in Software Supply Chain Security

Explore key insights from CodeSecDays 2024 on software supply chain security. Learn about AI in DevSecOps, SLSA frameworks, developer-security collaboration, and secrets management. Discover strategies for a more secure digital future. The post ...

Scammers Rush In to Exploit CrowdStrike Chaos

Scammers are rushing into exploit the chaos created when an software update by CrowdStrike went awry, knocking out 8.5 million Windows devices and creating the opportunity for bad actors to run phishing and other malicious campaigns. The post ...

USENIX Security ’23 – Automated Analysis Of Protocols That Use Authenticated Encryption: How Subtle AEAD Differences Can Impact Protocol Security

Distinguished Paper Award Winner Authors/Presenters:Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

How to Prepare Your Workforce for the Deepfake Era

Of all of the AI-powered weapons, the one that your employees may be the least equipped to resist is deepfake technology.  The post How to Prepare Your Workforce for the Deepfake Era appeared first on Security Boulevard.

Introducing the API Threat Landscape, a new resource for API security researchers

Since 2022, Escape's security research team has been tracking API-related data breaches. We’ve decided to make our database public, providing detailed insights into primary attack vectors, threat actors, tools, and techniques. The database is ...

Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity

A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs. The post Beyond Your Mess for Less: How Managed Services can Provide Sustainable ...

CISA Alert Calls Out Operating System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the Federal Bureau of Investigations (FBI) has jointly issued a Secure by Design Alert in response to threat actor campaigns that exploit operating system (OS) ...

Why SSL certificates expire: exploring the benefits of shorter validity periods

SSL certificates expire to enhance security, comply with evolving regulations, and encourage timely updates. Shorter validity periods, soon to be 90 days, improve cybersecurity by ensuring frequent renewals, minimizing risks associated with ...

How to Select a Qualified SOC 2 Auditor

Obtaining a SOC 2 (Service Organization Control 2) certification is crucial in ensuring your data’s security and privacy. SOC 2 compliance demonstrates that your organization adheres to high standards for managing customer data based on five ...

Heeler Security raises $8.5 million to boost application security

Heeler Security announced the successful closing of an $8.5 million Seed Series funding round, led by Norwest Venture Partners with significant participation from Storm Ventures. “Application security requires a new approach that focuses on ...

Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update

By now, most people are aware of – or have been personally affected by – the largest IT outage the world have ever witnessed, courtesy of a defective update for Crowdstrike Falcon Sensors that threw Windows hosts into a ...

AI Security: How Hard Is It to Develop Secure AI?

This blog is based on our conversation with Rob van der Veer, Senior Principal Expert at the Software Improvement Group. It explores the complex challenges of developing secure AI systems and the critical role of governance and role segregation ...

The Human Adaptability Gap and How to Close It

The “adaptability gap”—the widening difference between the rapid pace of technological progress and the slower rate of human, or employee adaptation. The post The Human Adaptability Gap and How to Close It appeared first on Security Boulevard.

Cross-industry standards for data provenance in AI

In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models’ performance and reliability. Jesani highlights the ...

Shuffle Automation: Open-source security automation platform

Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. It’s designed to integrate with Managed Security Service Providers ...

Cyber insurance 2.0: The systemic changes required for future security

Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at ...

Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver

ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET dubbed HotPage, comes self-contained in an executable file that installs ...

Enhancing Code Security with GitGuardian and GGShield

In today’s software development landscape, securing code repositories against leaks and vulnerabilities is paramount. Tools like…Continue reading on Medium »

USENIX Security ’23 – How Fast Do You Heal? A Taxonomy For Post-Compromise Security In Secure-Channel Establishment

Authors/Presenters:Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to ...