Application Security News and Articles


Inversion6 launches service to help companies combat cyber threats

Inversion6 launched its new Incident Response (IR) Service, a comprehensive offering to help organizations effectively manage, mitigate and recover from cybersecurity incidents. “Our new service empowers businesses to respond to incidents ...

Supported Security: Integrating PAM with DevSecOps

Are We Doing Enough to Secure Non-Human Identities? NHIs: An Overlooked Pillar of Modern Security Where digital transformation is accelerating across all industries, how secure are your Non-Human Identities (NHIs)? As an essential component of ...

Trust in Cloud Compliance: Ensuring Regulatory Alignment

Can Your Organization Trust in Cloud Compliance? As businesses increasingly transition to cloud-based operations, the question arises: Can we trust the cloud to keep our data secure and compliant? With the rise of regulatory standards and data ...

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this cyberespionage campaign, the attackers compromised the legitimate ...

Acronis CISO on why backup strategies fail and how to make them resilient

In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures, and offers actionable advice for organizations looking to improve their backup and recovery ...

Privacy professionals feel more stressed than ever

Despite progress made in privacy staffing and strategy alignment, privacy professionals are feeling increasingly stressed on the job within a complex compliance and risk landscape, according to new research from ISACA. Top three obstacles facing ...

Cybersecurity books on ransomware you shouldn’t miss

This list of ransomware-focused cybersecurity books is tailored for professionals seeking practical insights and deeper knowledge. Covering technical strategies, real-world cases, and the evolving tactics of attackers, these books offer valuable ...

Improving Security Posture with Smarter Firewall Policies: Lessons from IDC’s Latest InfoBrief

Hybrid environments have rapidly become a staple of modern IT infrastructure. Organizations are increasingly combining on-premises, cloud, and edge computing resources, creating a complex network infrastructure that requires meticulous ...

GDPR Compliance in the US: Checklist and Requirements

The European Union (EU)’s General Data Protection Regulation (GDPR) isn’t just a European concern. As GDPR-U.S. interactions become more complex, international businesses (including American ones) must comply with this regulation when ...

AI Code Generation: The Risks and Benefits of AI in Software

AI code generation is changing how developers approach their work. Modern code completion AI tools like GitHub Copilot and ChatGPT offer faster development cycles, improved productivity, and the ability to automate repetitive tasks.  The post AI ...

What PCI Attestation of Compliance Is and How to Get It

Every time a customer swipes their credit card, they trust that business to protect their sensitive payment information against mishandling or fraud. But proving that trust in the right place requires certification. The post What PCI Attestation ...

Understanding the Principle of Least Privilege (PoLP)

The rule of least privilege, also known as the principle of least privilege (PoLP), is a security measure for safeguarding sensitive systems and data. PoLP ensures that users, applications, and systems have only the minimum access necessary to ...

Imperva Protects Against the Exploited CVEs in the Cleo Data Theft Attacks

The Clop ransomware group has once again demonstrated its ability to exploit vulnerabilities to compromise sensitive systems. As Cleo—a managed file transfer provider for businesses—grapples with the aftermath of Clop’s targeted attack on ...

DEF CON 32 – A (Shallow) Dive Into World Of Aircraft PKI

Author/Presenter: Matt Gaffney Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Start the year by protecting your privacy— A stalkerware quick check

Imagine starting the New Year with hopes of a fresh start, only to realize that someone might be tracking your every move without your consent. Disconcerting, to say the least.   The post Start the year by protecting your privacy— A ...

Randall Munroe’s XKCD ‘Uncanceled Units’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Uncanceled Units’ appeared first on Security Boulevard.

Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban

Not For You: “Protecting Americans from Foreign Adversary Controlled Applications Act” shouldn’t be enforced, orders President Trump. The post Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban appeared first on Security Boulevard.

Life at SpecterOps Part II: From Dream to Reality

TL;DR We are hiring consultants at various levels. The job posting can be found under the Consultant opening here: https://specterops.io/careers/#careers Introduction Hey, it’s me again! The last time we spoke back in August 2024, I told you ...

Healthcare Cybersecurity: The Chronic Condition We Can’t Ignore

Cyber breaches in healthcare are chronic conditions that can linger for years, quietly draining resources and eroding trust. Imagine a chronic disease. There’s the immediate crisis phase that demands urgent attention—medication, hospital ...

DEF CON 32 – Analyzing the Security of Satellite Based Air Traffic Control

Author/Presenter: Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...