Application Security News and Articles


How to Leverage the FAIR Model with the NIST CSF

In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and measuring risk that it makes it difficult to pin any one thing down, ...

What is a Compromised Credentials Attack? 

The education industry is among the most highly targeted of all sectors. K-12 schools are particularly at risk, given the vast amount of sensitive information they hold. Out of all forms of cyberattacks, compromised credentials attacks are among ...

Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs

In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as you'll see below). By the end of the ...

NYDOH Cybersecurity Regulations: What Healthcare Providers Need to Know in 2025

10 NYCRR 405.46: NY’s New Hospital Cyber Regulation  Hospitals are no strangers to health data privacy laws like HIPAA. But New York’s new cybersecurity regulations take things to the next level. Finalized by the New York State Department of ...

Ukrainian hacker gets prison for infostealer operations

Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service ...

Netwrix 1Secure enhances protection against data and identity access risks

Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome ...

NetSPI introduces external attack surface management solutions

NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous ...

The Best Mimecast DMARC Analyzer Alternatives and Competitors

Check out the list of top 10 Mimecast Dmarc analyzer alternatives. Find the best solution for your email security by considering their pros & cons & pricing. The post The Best Mimecast DMARC Analyzer Alternatives and Competitors appeared ...

Ataccama ONE platform enhancements accelerate enterprise data quality initiatives

Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its ...

Enpass simplifies compliance and security controls for password management

Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further ...

Turning Insights into Action: The Importance of Vulnerability Remediation after VAPT

Vulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing ...

2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite

By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive. The post 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite appeared first on Security ...

Understanding Virtual Skimmers: A Threat to E-Commerce Security 

Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late. The post Understanding Virtual Skimmers: A Threat to E-Commerce Security  appeared first on Security Boulevard.

Acumen Threat Analysis: Preparing for 2025 

Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned ...

Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions

Arctic Wolf this week revealed it has acquired the Cyclance endpoint security platform from Blackberry for $160 million. The post Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions appeared first on Security Boulevard.

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience madhav Thu, 12/19/2024 - 05:33 As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) ...

Are threat feeds masking your biggest security blind spot?

Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post Are threat feeds masking your biggest security blind ...

Leadership skills for managing cybersecurity during digital transformation

In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The ...

Apache Tomcat Conditional Competition Code Execution Vulnerability (CVE-2024-50379)

Overview Recently, NSFOCUS CERT detected that Apache issued a security announcement, fixing the Apache Tomcat conditional competition code execution vulnerability (CVE-2024-50379). Due to the inconsistency between Windows file system and Tomcat ...

Ransomware in 2024: New players, bigger payouts, and smarter tactics

In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this ...