Application Security News and Articles


Cisco Duo provider breached, SMS MFA logs compromised

Hackers have managed to compromise a telephony provider for Duo, the Cisco-owned company providing secure access solutions, and steal MFA (multi-factor authentication) SMS message logs of Duo customers. About the attack The unnamed provider ...

MixMode Launches Advanced AI-Powered Attack Detection Prioritization  

MixMode today announced enhancements to the MixMode Platform aimed at reducing risk and empowering security teams. Featured enhancements include AI-powered threat prioritization that combines MixMode's patented AI with known indicators of ...

USENIX Security ’23 – Account Verification on Social Media: User Perceptions and Paid Enrollment

Authors/Presenters: *Madelyne Xiao, Mona Wang, Anunay Kulshrestha, and Jonathan Mayer* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

Evaluating the Impact of CISA’s Secure Software Development Attestation on Government Software…

Bolstering Software Security: How CISA’s Attestation Protocol Impacts Government Software DevelopmentContinue reading on Technology Hits »

Vercara UltraEdge offers protection against internet-based threats

Vercara launched UltraEdge, a comprehensive edge platform that includes an innovative Content Delivery Network (CDN), integrated application security, and edge compute. Powered by Edgio and supported through Vercara’s Security Operations Center ...

Tanium Automate reduces manual processes for repeatable tasks

Alongside Tanium Guardian and its partnership with Microsoft Copilot for Security, Tanium Automate serves as another critical component in support of the autonomous endpoint management (AEM) capabilities within the Tanium XEM platform. The ...

Decision-Makers and Staffing Trends: Insights from the 2024 Benchmark Survey Report

Navigating the complex world of IT risk and compliance can be daunting for many organizations. However, with the right insights, companies can better understand how to make the right decisions about Governance, Risk, and Compliance (GRC) ...

Data Loss Prevention: Best Practices for Secure Data Management

The stakes for safeguarding sensitive information have never been higher. Cyber Data loss can lead to severe consequences, including financial losses, damage to reputation, and legal repercussions.  Section 1: Understanding the Dynamics of Data ...

New open-source project takeover attacks spotted, stymied

The OpenJS Foundation has headed off a “credible takeover attempt” similar to the one that resulted in a backdoor getting included in the open-source XZ Utils package by someone who called themselves “Jia Tan”. This ...

AI Helps Security Teams, But Boosts Threats 

Industrial control systems, application containers, and mobile devices are the top contenders on this year's list of the most difficult assets to secure. The post AI Helps Security Teams, But Boosts Threats  appeared first on Security Boulevard.

Cequence Product Integrations – Broadcom Layer7 API Gateway

Today, we’ll spend some time talking about integrating Cequence solutions with the Broadcom Layer7 API Gateway. Broadcom API Gateway, previously known as Layer7 API Gateway, is an enterprise-grade solution designed to provide centralized ...

A Crash Course in Hardware Hacking Methodology: The Ones and Zeros

Author: Nathan Keys The Internet-of-Things (IoT) has quickly and seamlessly become woven into the fabric of our daily existence. With […] The post A Crash Course in Hardware Hacking Methodology: The Ones and Zeros appeared first on Security ...

OWASP’s LLM AI Security & Governance Checklist: 13 action items for your team

Artificial intelligence is developing at a dizzying pace. And if it's dizzying for people in the field, it's even more so for those outside it, especially security professionals trying to weigh the risks the technology poses to their ...

Lessons From the Sisense Breach: Security Essentials Companies Can’t Afford to Forget

This blog gives an overview of the Sisense breach, the types of data compromised in the hack, and lessons for companies to learn from. The post Lessons From the Sisense Breach: Security Essentials Companies Can’t Afford to Forget appeared first ...

GuidePoint Security introduces IoT Security Assessment

GuidePoint Security announced its IoT Security Assessment, a new cybersecurity service. GuidePoint Security’s team of IoT security and embedded systems experts have extensive experience identifying potential weaknesses in IoT devices and ...

Knowledge & Research Security

This Article Knowledge & Research Security was first published on Signpost Six. | https://www.signpostsix.com/ In a world where knowledge is as open as it is vulnerable, safeguarding your institution’s intellectual assets is paramount. ...

Sectigo SCM Pro automates certificate management

Sectigo launched SCM Pro, a solution to bring the robustness of enterprise CLM to Small and midsize enterprises (SMEs), effectively leveling the playing field between large enterprises and the mid-market. Online identity proliferation, hybrid ...

IDnow VideoIdent Flex blends AI technology with human interaction

IDnow has unveiled VideoIdent Flex, a new version of its expert-led video verification service that blends advanced AI technology with human interaction. The human-based video call solution, supported by AI, has been designed and built to boost ...

Several GTKWave Vulnerabilities Fixed in Debian

Recently, the Debian security team fixed several issues in GTKWave, an open-source waveform viewer for VCD (Value Change Dump) files. These vulnerabilities, if exploited, could result in the execution of arbitrary code, posing a significant risk ...

FTC Reports Email is a Popular Medium for Impersonation Scams

Reading Time: 6 min Scammers impersonate businesses and government in emails to steal your information. Discover FTC's new rule and tips to fight email impersonation scams. The post FTC Reports Email is a Popular Medium for Impersonation Scams ...