Application Security News and Articles
In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and measuring risk that it makes it difficult to pin any one thing down, ...
The education industry is among the most highly targeted of all sectors. K-12 schools are particularly at risk, given the vast amount of sensitive information they hold. Out of all forms of cyberattacks, compromised credentials attacks are among ...
In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as you'll see below). By the end of the ...
10 NYCRR 405.46: NY’s New Hospital Cyber Regulation Hospitals are no strangers to health data privacy laws like HIPAA. But New York’s new cybersecurity regulations take things to the next level. Finalized by the New York State Department of ...
Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service ...
Netwrix released a new version of its SaaS platform, Netwrix 1Secure. The latest version builds on its existing security monitoring functionality with more robust access rights assessment and expanded security auditing capabilities to overcome ...
NetSPI introduced three tiers of external attack surface management (EASM) solutions, delivered through the The NetSPI Platform. The new offerings address the evolving needs of NetSPI’s global customer base, to move toward a continuous ...
Check out the list of top 10 Mimecast Dmarc analyzer alternatives. Find the best solution for your email security by considering their pros & cons & pricing.
The post The Best Mimecast DMARC Analyzer Alternatives and Competitors appeared ...
Ataccama announced enhancements to the Ataccama ONE unified data trust platform v15.4 that enable customers to have confidence in using their data for business-critical decision-making. In this latest release, enhancements include augmenting its ...
Enpass added Single Sign-On (SSO) for its admin console in support for its Business Enterprise customers. Enpass integrates seamlessly with prominent Identity Providers (IDPs) such as Google Workspace, Okta, and Microsoft Entra ID, further ...
Vulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing ...
By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive.
The post 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite appeared first on Security ...
Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late.
The post Understanding Virtual Skimmers: A Threat to E-Commerce Security appeared first on Security Boulevard.
Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned ...
Arctic Wolf this week revealed it has acquired the Cyclance endpoint security platform from Blackberry for $160 million.
The post Arctic Wolf Acquires Cylance Endpoint Security Platform to Further AI Ambitions appeared first on Security Boulevard.
IAM Predictions for 2025: Identity as the Linchpin of Business Resilience
madhav
Thu, 12/19/2024 - 05:33
As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) ...
Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources.
The post Are threat feeds masking your biggest security blind ...
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation.
The ...
Overview Recently, NSFOCUS CERT detected that Apache issued a security announcement, fixing the Apache Tomcat conditional competition code execution vulnerability (CVE-2024-50379). Due to the inconsistency between Windows file system and Tomcat ...
In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this ...