Application Security News and Articles
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books ...
Author/Presenter: Tony Sage
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...
i-Soon employees charged with conducting extensive hacking campaigns on behalf of Beijing’s security services.
The post US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives appeared first on SecurityWeek.
Won’t Tim Think of the Children? End-to-end encryption battle continues.
The post Apple vs. UK — ADP E2EE Back Door Faceoff appeared first on Security Boulevard.
via the comic humor & dry wit of Randall Munroe, creator of XKCD
Permalink
The post Randall Munroe’s XKCD ‘RNA’ appeared first on Security Boulevard.
This is the second article of our series about anti-detect browsers. In the first article, we gave an overview of anti-detect browsers, their main features and what they’re used for. In this second article, we do a deep dive into Undetectable, ...
When we founded SpecterOps, one of our core principles was to build a company which brought unique insight into high-capability adversary tradecraft, constantly innovating in research and tooling. We aspired to set the cadence of the cyber ...
SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform.
The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform appeared first on ...
Properly securing containers has never been easy, but the rise of software supply chain attacks — and new threats coming from AI — makes additional security controls essential. Threats and risks must be identified and addressed before ...
Delve into the world of digital passports, understanding their benefits, security challenges, and how they're transforming identity verification and travel experiences.
The post The Rise of Digital Passports: Navigating the Security Implications ...
In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform.
The post MixMode Uncovers Nation-State Attacks, ...
Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks.
The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on ...
Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in the wake ...
Author/Presenter: Jeffrey Knockel, Mona Wang
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...
Eric Gan, who last month filed a lawsuit against top Cybereason investors for rejecting multiple financing plans, reportedly resigned as the company's CEO after months of turmoil within the cybersecurity company's boardroom.
The post Cybereason ...
The massive Eleven11bot has compromised more than 86,000 IoT devices, including security cameras and network video recorders, to launch hundreds of DDoS attacks, and security researchers say the threat actors behind the botnet are trying to grow ...
An Iranian threat actor was seen targeting UAE organizations with polyglot files to deliver a new backdoor named Sosano.
The post Iranian Hackers Target UAE Firms With Polyglot Files appeared first on SecurityWeek.
We’re losing — but it can’t get any worse, right?
LLMs are being used in many ways by attackers; how blind are you?
We’re spending hundreds of billions and losing trillions in cybersecurity. The industry structure is partially to ...
North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms.
The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek.
AI is a Necessity, But a Chief AI Officer Might Not Be Feasible Artificial Intelligence (AI) is transforming industries, optimizing operations, and redefining how businesses...Read More
The post If Businesses Can’t Afford a Chief AI Officer? ...