Application Security News and Articles


Open-source and free Android password managers that prioritize your privacy

We’re often told to use strong, unique passwords, especially for important accounts like email, banking, and social media. However, managing different passwords for numerous accounts can be challenging. Password managers simplify this by ...

Barracuda Networks Report Sees Sextortion Becoming More Personalized

A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased. The post Barracuda Networks Report Sees Sextortion Becoming More Personalized appeared first on Security ...

Google report shows CISOs must embrace change to stay secure

Google’s latest report, conducted in partnership with Hypothesis Group, reveals a stark reality for organizations: incremental security measures are no longer sufficient. The study, involving over 2,000 decision-makers across the US, UK, ...

Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces ...

Ace AI: Generate Playbooks with Built-In Expertise Across Every Relevant Domain

Your AI dream team awaits. Ace AI automates expert security playbooks in hours, not weeks. Save time, enhance security, and take control. The post Ace AI: Generate Playbooks with Built-In Expertise Across Every Relevant Domain appeared first on ...

ASPM vs. CSPM: Key Differences

With dozens of cybersecurity threats out there, maintaining your company’s security posture is more important than ever. And with so many types of technology to oversee—from cloud infrastructure to AI-generated code—there are just as many ...

Compliance Automation: How to Get Started and Best Practices

Managing compliance manually is an uphill battle, especially when regulatory requirements are constantly changing. The post Compliance Automation: How to Get Started and Best Practices appeared first on Security Boulevard.

DEF CON 32 – Autos, Alcohol, Blood, Sweat, & Creative Reversing Obfuscated Car Modding Tool

Authors/Presenters: Atlas Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Randall Munroe’s XKCD ‘Europa Clipper’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Europa Clipper’ appeared first on Security Boulevard.

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

DevOpsDays Chattanooga 2024 delivered key insights on collaboration, security, and agile workflows with engaging talks, ignite sessions, and open discussions. The post DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation appeared first ...

DEF CON 32 – Manipulating Shim And Office For Code Injection

Authors/Presenters: Ron Ben-Yizhak, David Shandalov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

DEF CON 32 – Secrets & Shadows: Leveraging Big Data For Vulnerability Discovery

Authors/Presenters: Bill Demirkapi Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

The Future of Search Marketing: Beyond Google’s Horizon

As traditional search marketing evolves, cybersecurity companies must embrace a new paradigm that combines AI-driven discovery, interactive tools, and secure platforms. Learn how to leverage multi-platform presence, intent-based search and ...

Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)

Palo Alto Networks has released fixes for two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in its next-generation firewalls that have been exploited by attackers as zero-days. About the vulnerabilities (CVE-2024-0012, CVE-2024-9474) ...

The Elephant in AppSec Talks Highlight: Reinventing API Security

Highlights from Escape's talks at The Elephant in AppSec Conference on the challenges of API security and how Escape is overcoming these The post The Elephant in AppSec Talks Highlight: Reinventing API Security appeared first on Security Boulevard.

Major security audit of critical FreeBSD components now available

The FreeBSD Foundation, in partnership with the Alpha-Omega Project, has released the results of an extensive security audit of two critical FreeBSD components: the bhyve hypervisor and the Capsicum sandboxing framework. The audit, conducted by ...

Smarter AppSec: How ADR, Secure by Design and ‘Shift Smart’ are Redefining Cybersecurity | Application Security Podcast Takeaways | Contrast Security

If there’s one thing Jeff Williams learned from years and years of doing pen testing and threat modeling, it’s this: They're highly time-pressured. The post Smarter AppSec: How ADR, Secure by Design and ‘Shift Smart’ are ...

Strengthening Security and Elevating User Experiences: Introducing Arkose Device ID in an Evolving Threat Landscape

n today’s increasingly digital and interconnected world, traditional security measures — once deemed foolproof — are now being exploited by sophisticated cybercriminals. Whether it’s fake account creation, account takeovers (ATO), session ...

A Look at Our Latest Feature Updates

At Arkose Labs, we’re always pushing boundaries to ensure our customers stay one step ahead of cybercriminals. Our commitment to innovation drives us to continuously enhance our platform, providing you with the capabilities needed to tackle ...

Guarding Your Brand: Why Domain Protection is Essential for Every Business Owner

Protect your business with domain protection. Learn how it prevents cyberattacks, phishing, and data breaches while keeping your personal information secure. The post Guarding Your Brand: Why Domain Protection is Essential for Every Business ...