Application Security News and Articles


Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand. The post Enzoic Acquires VeriClouds appeared first on Security Boulevard.

Hornetsecurity DMARC Manager protects against fraud and phishing attacks

Hornetsecurity launched DMARC Manager, an advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud ...

Splunk simplifies infrastructure requirements for Microsoft Azure customers

Splunk announced its enterprise security, observability and platform offerings on Microsoft Azure. In partnering with Microsoft, Splunk empowers organizations to scale their digital transformation on Azure with unified solutions that accelerate ...

Introducing Third-Party Access Control: Protecting Cloud Resources Like Never Before

The desire to quickly deploy and maintain third-party tools often leads organizations to grant broad, sometimes excessive permissions in their cloud environments. While this is convenient for onboarding and operations, it creates significant ...

“Deny All” for Public Buckets: AWS Resource Control Policies (RCP) Extend Centralized Cloud Governance

AWS’s release of Resource Controls Policies (RCP) when used in combination with existing Service Control Policies (SCP), enables Cloud Architects to create an identity perimeter controlling all undesired permissions and access to resources at ...

Why shift left alone isn’t enough to manage software risk

Application security wouldn’t be what it is today without “shift left,” the concept that security practices should be handled much earlier in the software development lifecycle (SDLC). Shift left brought about new era strategies such as ...

Cybersecurity is Everyone’s Responsibility

In our digital age, cybersecurity is a shared mission. Each of us has a part to play. By staying informed, adopting best practices and remaining alert, we can all contribute to a safer online environment. The post Cybersecurity is Everyone’s ...

Space tech giant Maxar confirms attackers accessed employee data

Satellite and space technology leader Maxar Space Systems has suffered a data breach. “Our information security team discovered that a hacker using a Hong Kong-based IP address targeted and accessed a Maxar system containing certain files ...

Cracking the Code: Tackling the Top 5 Cloud Security Challenges

By developing robust, adaptive security strategies, organizations can effectively safeguard their cloud environments against evolving threats and ensure compliance with regulatory requirements. The post Cracking the Code: Tackling the Top 5 Cloud ...

Unlocking the Power and Potential of GenAI in Software Development

As GenAI becomes an indispensable tool in software development, organizations are embracing its ability to drive innovation and streamline operations. But this rapid adoption brings with it significant challenges in security, governance, and ...

Oracle patches exploited Agile PLM vulnerability (CVE-2024-21287)

Oracle has released a security patch for CVE-2024-21287, a remotely exploitable vulnerability in the Oracle Agile PLM Framework that is, according to Tenable researchers, being actively exploited by attackers. About CVE-2024-21287 Oracle Agile ...

Open-Source Security Tools are Free… And Other Lies We Tell Ourselves

The most expensive security tool isn't the one you pay for - it's the one that fails when you need it most. Just ask those 110,000 websites that thought they were saving money. The post Open-Source Security Tools are Free… And Other Lies We ...

Phobos ransomware administrator faces US cybercrime charges

The Justice Department unsealed criminal charges against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptitsyn made his initial appearance in the US District Court ...

Aon Cyber Risk Analyzer helps organizations evaluate cyber risk

Aon launched its Cyber Risk Analyzer, a digital application that allows risk managers to make data-driven, technology-enabled decisions to mitigate cyber risk. The tool is the latest in a series of new offerings, which brings together Aon’s ...

AlmaLinux 9.5 released: Security updates, new packages, and more!

AlmaLinux is a free, open-source, enterprise-grade Linux distribution. Governed and owned by the community, it offers a production-ready platform with binary compatibility to Red Hat Enterprise Linux. AlmaLinux 9.5, codenamed Teal Serval, is now ...

Belden announces products designed to enhance data security

Belden announces new network and data infrastructure products designed for secure, high-quality performance in critical applications. Data orchestration & management Hirschmann EAGLE40-6M Train Firewalls meet the demands of railway rolling ...

Ransomware Evolution: From Triple-Quadruple Extortion to RaaS

In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the wave of digital invasions that the world has been witnessing with an attack occuring every two seconds. From the monetary aspect, a 30% increase in ...

Dev + Sec: A collaborative approach to cybersecurity

The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver features and products quickly with a fast-paced, iterative development ...

Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters

Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters madhav Tue, 11/19/2024 - 05:28 International Fraud Awareness Week (November 17-23) is a critical time to consider the significant risks that fraud poses to ...

Why AI alone can’t protect you from sophisticated email threats

In this Help Net Security interview, Riaz Lakhani, CISO at Barracuda Networks, discusses the effectiveness of AI-based behavioural analysis in combating sophisticated email threats like BEC and VEC. Lakhani also explains how AI tools help detect ...