Application Security News and Articles


Top Digital Tools for the Classroom

Digital tools are reshaping the traditional K-12 learning experience, unleashing a wave of benefits in the process. This guide explores the significance of digital tools for the classroom and how they can support your school district in creating ...

Contrast Security AVM identifies application and API vulnerabilities in production

Contrast Security released Application Vulnerability Monitoring (AVM), a new capability of Application Detection and Response (ADR). AVM works within applications to find application and API vulnerabilities in production and correlate those ...

Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?

A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user credentials. The collection has been leaked on Monday and publicized on an underground forum by the threat ...

Best AutoSPF Alternatives: Detailed Feature Comparison

Discover top AutoSPF alternatives for dynamic SPF flattening and better email deliverability with advanced features and pricing. The post Best AutoSPF Alternatives: Detailed Feature Comparison appeared first on Security Boulevard.

New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)

ESET researchers have identified a vulnerability (CVE-2024-7344) impacting most UEFI-based systems, which allows attackers to bypass UEFI Secure Boot. The issue was found in a UEFI application signed with Microsoft’s “Microsoft Corporation ...

Cisco AI Defense safeguards against the misuse of AI tools

Cisco announced Cisco AI Defense, a pioneering solution to enable and safeguard AI transformation within enterprises. As AI technology advances, new safety concerns and security threats are emerging at an unprecedented speed which existing ...

HarvestIQ.ai provides actionable insights for cybersecurity professionals

IT-Harvest launched HarvestIQ.ai, a platform featuring two AI assistants designed to redefine how professionals navigate the cybersecurity landscape. The Analyst AI provides access to IT-Harvest’s comprehensive database of 4,070 ...

Regula enhances Document Reader SDK with full support for Digital Travel Credentials

Regula has updated its Regula Document Reader SDK. Now, the software fully supports the new Digital Travel Credential (DTC) format, aligned with the International Civil Aviation Organization (ICAO) standards. This enhancement enables governments, ...

Entrust PKI Hub streamlines PKI, certificate lifecycle management, and automation

Entrust launched PKI Hub, providing enterprise visibility, management, and automation for cryptographic assets in an all-in-one, container-based virtual appliance that can be simply deployed at scale in the cloud or on-premises. Entrust PKI Hub ...

Red Hat Connectivity Link enhances security across multiple layers of application infrastructure

Red Hat introduced Red Hat Connectivity Link, a hybrid multicloud application connectivity solution that provides a modern approach to connecting disparate applications and infrastructure. Red Hat Connectivity Link integrates advanced traffic ...

Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence

Join cybersecurity leader Erwin Eimers from Sumitomo Chemicals Americas to explore how AI-driven Network Detection and Response (NDR) enhances SIEM capabilities, bridging critical visibility gaps in converged IT/OT environments. Learn how NDR ...

10 Essential GRC Policy Management Best Practices

Policy management is the sturdy scaffolding that supports governance, risk, and compliance (GRC) objectives while shaping corporate culture and ensuring adherence to regulatory obligations. Yet, many organizations grapple with a fragmented ...

Infectious Prompt Injection Attacks on Multi-Agent AI Systems 

LLMs are becoming very powerful and reliable, and multi-agent systems — multiple LLMs having a major impact tackling complex tasks — are upon us, for better and worse.  The post Infectious Prompt Injection Attacks on Multi-Agent AI Systems  ...

How CISOs can elevate cybersecurity in boardroom discussions

Ross Young is the CISO in residence at Team8 and the creator of the OWASP Threat and Safeguard Matrix (TaSM). In this interview, he shares his perspective on how cybersecurity professionals can tailor their presentations to the board, aligning ...

A humble proposal: The InfoSec CIA triad should be expanded

The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents. In this article, I will analyze the CIA ...

Critical vulnerabilities remain unresolved due to prioritization gaps

Fragmented data from multiple scanners, siloed risk scoring and poor cross-team collaboration are leaving organizations increasingly exposed to breaches, compliance failures and costly penalties, according to Swimlane. The relentless surge of ...

Microsoft’s January Security Update of High-Risk Vulnerabilities in Multiple Products

Overview On January 14, NSFOCUS CERT detected that Microsoft released a security update patch for January, which fixed 159 security problems in widely used products such as Windows, Microsoft Office, Microsoft Visual Studio, Azure, Microsoft ...

Fortinet OS & FortiProxy Authentication Bypass Vulnerability (CVE-2024-55591) Notification

Overview Recently, NSFOCUS CERT detected that Fortinet has issued a security notification and fixed the identity authentication bypass vulnerability in FortiOS and FortiProxy (CVE-2024-55591). Unauthenticated attackers can bypass system identity ...

7 Essential Security Operations Center Tools for 2025

The post 7 Essential Security Operations Center Tools for 2025 appeared first on AI Security Automation. The post 7 Essential Security Operations Center Tools for 2025 appeared first on Security Boulevard.

News alert: Aembit announces speakers for NHIcon event, highlighting non-human identity security

Silver Spring, MD, Jan. 15, 2025, CyberNewswire — Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live ...