Application Security News and Articles


A new playground: Malicious campaigns proliferate from VSCode to npm

ReversingLabs researchers have been monitoring multiple public repositories over the past few years. Recently, our team has expanded its threat hunting efforts to VSCode Marketplace — and the researchers started to see an increasing amount of ...

European companies hit with effective DocuSign-themed phishing emails

A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of multiple victims in different firms, according to Palo Alto Networks’ Unit 42 researchers. The ...

BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)

BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products that may allow remote code execution, and is urging organizations with on-premise ...

Appdome protects applications running on mobile-enabled platforms

Appdome announced that the Appdome Mobile Defense Platform now protects applications running on mobile-enabled platforms like Apple macOS, Apple visionOS, Meta Quest, HarmonyOS Next, Android Auto, Apple CarPlay, Android TV, Apple TV, and Google ...

The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them

Remember, there is no free lunch with AI. The upsides are tremendous, but security cannot be an afterthought. The post The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them appeared first on Security Boulevard.

Stairwell Core boosts threat intelligence for security teams

Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible ...

4 Ways To Unleash Speed and Efficiency in the SOC

With the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. The post 4 Ways To Unleash Speed and Efficiency in the SOC appeared first on Security ...

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

Today, part three of Last Watchdog’s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, ...

5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year

A CLM policy also puts you in the best position to mitigate and prevent cyberthreats, including man-in-the-middle attacks and phishing scams. The post 5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year appeared first ...

GitGuardian launches multi-vault integration to combat secrets sprawl

GitGuardian unveiled a comprehensive Non-Human Identity (NHI) security strategy with integrations across major secrets management platforms, addressing the growing challenge of secrets sprawl in enterprise environments. With Non-Human ...

Travel Cybersecurity Threats and How to Stay Protected

Uncover the latest travel cybersecurity threats, from public Wi-Fi risks to AI-powered attacks. Learn strategies to protect your data and travel safely. The post Travel Cybersecurity Threats and How to Stay Protected appeared first on Security ...

CrowdStrike Allies With Salt Security to Improve API Security

CrowdStrike and Salt Security have extended their alliance to make it simpler to feed application programming interface (API) security data directly into a security information event management (SIEM) platform. The post CrowdStrike Allies With ...

CISO accountability: Navigating a landscape of responsibility

What was once primarily a technical role, CISOs now find themselves accountable for organizational risk, regulatory compliance, and even legal liabilities across the entire organization. However, as cyber threats intensify, it’s clear that ...

Key steps to scaling automated compliance while maintaining security

In this Help Net Security interview, Vivek Agarwal, Privacy Program Manager at Meta Platforms, shares insights on strategies for reducing time to market, improving vendor onboarding, and updating privacy requirements to ensure compliance across ...

Why Over-the-Air Updates are Key for Mobile App Security in the AI Era

  The rapid pace of technological advancements, particularly in artificial intelligence (AI), has transformed both the opportunities and threats in the mobile app ecosystem. This blog describes why over-the-air (OTA) updates to security ...

Vanir: Open-source security patch validation for Android

Google’s open-source tool Vanir enables Android developers to quickly scan custom platform code for missing or applicable security patches. By automating patch validation, Vanir helps OEMs deliver critical security updates faster, enhancing ...

Consumers wrongly attribute all data breaches to cybercriminals

Breaches in 2024 had less impact on consumers’ trust in brands compared to the previous year (a 6.5% decrease from 62% in 2023 to 58% in 2024), according to a recent Vercara report. Most consumers also remain unaware of the role they may play ...

Securing SaaS – Lessons, Trends, and Strategies for 2025 with Guest Forrester

Our guest speaker, Forrester Vice President, Principal Analyst, Andras Cser, will share key insights on the risks and trends shaping the SaaS security landscape as we move into 2025. The post Securing SaaS – Lessons, Trends, and Strategies for ...

Securing Your SaaS: How AppOmni Mitigates SaaS Risks and Protects Data

In this 20 minute session, we’ll introduce you to AppOmni, the platform designed to reduce SaaS data exposure, detect threats, and prevent data breaches. The post Securing Your SaaS: How AppOmni Mitigates SaaS Risks and Protects Data appeared ...

Achieving Stability in Cloud Compliance and Security

Can Cybersecurity Truly Achieve Stability in the Cloud? The increasing adoption of cloud technologies in various industries, from healthcare to financial services, makes the question of stability in cloud compliance and security a top priority. ...