Application Security News and Articles


Back to the Basics For 2025: Securing Your Business

Gary Perkins, CISO at CISO Global Cybersecurity may seem complex, but it boils down to consistent implementation of best practices. Disabling unnecessary services, securing cloud configurations, enforcing MFA, training employees, and adopting a ...

The Good, the Bad, and the Politics of Biden’s Cybersecurity Order

President Biden in the last few days of his administration issued an expansive cybersecurity EO that touched on issues like software supply chain, AI, and foreign adversaries. Many approved of the effort, though there were concerns that the ...

This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump

Wow. Just Wow: Joseph Robinette Biden Jr. hits the emergency “do something” button. The post This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump appeared first on Security Boulevard.

Why PCI Compliance is Critical for Payment Data Protection—and How DataDome Page Protect Can Help

Prepare for the March 2025 PCI DSS 4.0 compliance deadline! Secure payment data, block skimming attacks, and simplify compliance with DataDome Page Protect. The post Why PCI Compliance is Critical for Payment Data Protection—and How DataDome ...

Randall Munroe’s XKCD ‘Uncanceled Units’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Uncanceled Units’ appeared first on Security Boulevard.

Cohesity Extends Services Reach to Incident Response Platforms

Cohesity has extended its Cyber Event Response Team (CERT) service to include third-party providers of incident response platforms, including Palo Alto Networks Unit 42, Arctic Wolf, Sophos, Fenix24 and Semperis. The post Cohesity Extends ...

Unveiling 2024’s Attack Trends: Insights from Source Defense Research

by Source Defense In 2024, Magecart attacks reached new levels of sophistication, targeting thousands of e-commerce websites worldwide. At Source Defense Research, we tracked dozens of campaigns leveraging advanced techniques, from exploiting ...

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, ...

DEF CON 32 – RFID 101

Authors/Presenters: Ege Feyzioglu & Andrew M Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Introducing BloodHound CLI

We created a new tool to help you install and manage BloodHound instances, BloodHound CLI! GitHub - SpecterOps/bloodhound-cli Written entirely in Go, this command-line tool can be cross-compiled to support Windows, macOS, and Linux, so you can ...

How Russian hackers went after NGOs’ WhatsApp accounts

Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets’ WhatsApp accounts through a clever phishing campaign. The campaign The campaign started with a spear-phishing ...

Advanced Persistent Threat (APT): Examples and Prevention

Advanced persistent threats (APTs) use sophisticated tools and techniques to breach systems and maintain access—all while remaining undetected. Unlike other cyberattacks, APTs work over an extended period, using more resources to achieve ...

Tarbomb Denial of Service via Path Traversal

As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, ...

California Wildfires Spark Phishing Scams Exploiting Chaos

As Southern California continues to battle devastating wildfires, cybercriminals have seized the opportunity to exploit the chaos, targeting vulnerable individuals and organizations. The post California Wildfires Spark Phishing Scams Exploiting ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/17/25

Insight No. 1: HIPAA amendments: More bureaucratic BS?  Most media reports are hyping proposed HIPAA amendments, claiming they'll magically close security gaps. Yeah, right. Like forcing already overwhelmed healthcare providers to jump through ...

Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook

Shopping for OT systems? A new CISA guide outlines OT cyber features to look for. Meanwhile, the U.S. government publishes a playbook for collecting AI vulnerability data. Plus, a White House EO highlights AI security goals. And get the latest on ...

Yahoo Japan Enforces DMARC Adoption for Users in 2025

Yahoo Japan enforces DMARC, SPF, and DKIM protocols starting December 2024 to strengthen email security and combat phishing. The post Yahoo Japan Enforces DMARC Adoption for Users in 2025 appeared first on Security Boulevard.

What is a Network Security Audit and How It Ensures Your Data Stays Safe?

Cyber threats are becoming more sophisticated and persistent, safeguarding sensitive data is paramount for businesses. From ransomware attacks to data breaches, organizations face constant threats that can compromise their operations and ...

MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware

A MikroTik botnet exploited weak SPF configurations, spoofing 20,000 domains to launch widespread malspam campaigns. The post MikroTik Botnet Exploits SPF Misconfigurations to Spread Malware appeared first on Security Boulevard.

1touch.io’s SaaS offering delivers enterprise-grade security

In an exciting development for organizations struggling with data security, 1touch.io has announced its Sensitive Data Intelligence platform as a Software-as-a-Service (SaaS) solution. This release extends 1touch.io’s powerful Contextual ...