Application Security News and Articles


USENIX NSDI ’24 – Crescent: Emulating Heterogeneous Production Network at Scale

Authors/Presenters:Zhaoyu Gao, Anubhavnidhi Abhashkumar, Zhen Sun, Weirong Jiang, Yi Wang Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and ...

USENIX NSDI ’24 – A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network

Authors/Presenters:Nils Blach, Maciej Besta, Daniele De Sensi, Jens Domke, Hussein Harake, Shigang Li, Patrick Iff, Marek Konieczny, Kartik Lakhotia, Ales Kubicek, Marcel Ferrari, Fabrizio Petrini, Torsten Hoefler Our sincere thanks to USENIX, ...

Managing Foreign Government Information (FGI) on a Network

If you’re a firm that works with foreign governments, in addition to certifications like ISO 27001 that you will generally need to achieve, you will also have to have processes in place for handling foreign government information or FGI. It’s ...

Pentesting Authentication

Pentesting authentication is a critical step of any gray-box pentest. Here we review steps of how a pentest should assess these controls. The post Pentesting Authentication appeared first on Virtue Security. The post Pentesting Authentication ...

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Many organizations are looking for trusted advisors, and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. Untrusted ...

Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Chris Clements, VP of Solutions Architecture Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement at all can make the difference between an ...

USENIX NSDI ’24 – MESSI: Behavioral Testing of BGP Implementations

Authors/Presenters:Rathin Singha, Rajdeep Mondal, Ryan Beckett, Siva Kesava Reddy Kakarla, Todd Millstein, George Varghese Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on ...

AI-Generated Personas: Trust and Deception

And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models such as ChatGPT. These ...

Seceon at GITEX Global 2024: Driving Cybersecurity Innovation with Tech First Gulf

In today’s ever-evolving cybersecurity landscape, organizations are grappling with a delicate balance: safeguarding their digital environments while managing costs and ensuring compliance. At GITEX Global 2024, Seceon proudly joined our partner ...

Daniel Stori’s Turnoff.US: ‘bash-gptl’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘bash-gptl’ appeared first on Security Boulevard.

USENIX NSDI ’24 – Netcastle: Network Infrastructure Testing At Scale

Authors/Presenters:Rob Sherwood, Jinghao Shi, Ying Zhang, Neil Spring, Srikanth Sundaresan, Jasmeet Bagga, Prathyusha Peddi, Vineela Kukkadapu, Rashmi Shrivastava, Manikantan KR, Pavan Patil, Srikrishna Gopu, Varun Varadan, Ethan Shi, Hany Morsy, ...

The transformation of open source: Lessons from the past decade

Over the past decade, the world of open source software has undergone a seismic transformation, both in terms of its scale and challenges. The post The transformation of open source: Lessons from the past decade appeared first on Security Boulevard.

Celebrating Excellence in Financial Services

Like most businesses, banks are facing a highly competitive future built on digital services. To succeed, they must modernize their IT infrastructure to deliver the experiences that customers now demand, without incurring the wrath of regulators. ...

Microsoft lost some customers’ cloud security logs

Microsoft has lost several weeks of cloud security logs that its customers rely on to spot cyber intrusions. What happened As reported by Business Insider earlier this month, Microsoft privately notified affected customers of this incident and ...

Army Cloud Program to Help SMBs Meet DoD Cyber Requirements

The U.S. Army is developing a cloud environment called N-CODE that will give smaller businesses access to the security technologies they need to meet stringent DoD cybersecurity requirements and compete for defense contracts. The post Army Cloud ...

Cybersecurity Snapshot: Tenable Report Warns About Toxic Cloud Exposures, as PwC Study Urges C-Suite Collaboration for Stronger Cyber Resilience

Check out invaluable cloud security insights and recommendations from the “Tenable Cloud Risk Report 2024.” Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Meanwhile, a report finds the ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/18/24

Insight #1: Data breach costs are climbing According to IBM’s latest Cost of a Data Breach report, data breach costs have risen 39.4% over the past decade and are now at almost $5 million per breach. We should make sure our cybersecurity ...

CISOs Concerned Over Growing Demands of Role

There are growing concerns among chief information security officers (CISOs) about the evolving demands of their role, with 84% advocating for a split into separate technical and business-focused positions. The Trellix and Vanson Bourne survey of ...

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for ...

Israeli orgs targeted with wiper malware via ESET-branded emails

Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email. The phishing email The attack took the form of a phishing email ostensibly sent by the “Eset ...