Application Security News and Articles


A Strong Executive Protection Program Is Now More Important Than Ever — Here’s How To Get Buy-In

The shocking killing of UnitedHealthcare’s CEO highlights the critical importance of corporate executive protection programs  The fatal shooting of UnitedHealthcare CEO Brian Thompson was a targeted and shocking act of violence. For many of ...

DEF CON 32 – HookChain A New Perspective For Bypassing EDR Solutions

Authors/Presenters: Helvio Carvalho Junior Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

How to Assess Virtual Machines Prior to Deployment with Spectra Assure

Many software development shops deliver their product releases via virtual machine (VM) disk images. Whether deployed to a cloud environment, data center, or elsewhere, delivering safe and secure images is vital. If vulnerabilities, malware, or ...

Randall Munroe’s XKCD ‘METAR’

Permalink The post Randall Munroe’s XKCD ‘METAR’ appeared first on Security Boulevard.

Is Your Website Leaking Sensitive Patient Information to Facebook? A disturbing story about HIPAA (and How to Avoid It)

Picture this scenario: You’ve used every tool you have to secure your web pages and forms so patient information is safe. One day, a potential patient Googles “hysterectomy options” and ends up on your hospital’s website. They browse ...

Classroom Manager: Online Classroom Management, Instruction, and Learning Made Easy

Technology is transforming teaching and learning in today’s classrooms by providing teachers and students with an ever-increasing array of digital tools and resources. The possibilities for innovation are endless, from video conferencing to ...

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection. The post Reflecting on a Year of Compromised Data appeared first on Security Boulevard.

Balbix is recognized in Forrester’s CRQ Solutions Landscape, Q4 2024

Last week, Balbix was recognized in the Forrester Cyber Risk Quantification (CRQ) Solutions Landscape, Q4 2024. You can read the report here. Increasingly, CRQ has become a key tool for security leaders for executive reporting, risk ...

DEF CON 32 – Leveraging Private APNs For Mobile Network Traffic Analysis

Author/Presenter: Aapo Oksman Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

5 Modern Computer Safety Tips You Should Know About

Protecting your computer in the hyper-connected world of today goes beyond merely preventing bothersome viruses. Smarter, quicker, and far more invasive than ever before are modern dangers. Cybercriminals no longer depend on simple strategies; ...

2024: A Year of Hyperproof Highlights, Innovations, and Milestones

As 2024 comes to a close, we at Hyperproof are reflecting on a year marked by remarkable progress and innovation. This year, we delivered exciting new features, expanded our global reach, and added powerful frameworks to help compliance teams ...

Attackers Can Find New APIs in 29 Seconds: Wallarm

Cybersecurity vendor Wallarm, using a honeypot, found that hackers can discover new APIs in 29 seconds and that APIs are now more targeted than web applications, highlighting the need to put a security focus on the increasingly popular business ...

Bits & Bytes: A Recap of AISS 2024

As a passionate cybersecurity enthusiast & a professional with ColorTokens, participating in the recently concluded 19th Annual Information Security Summit (AISS) 2024, organized by NASSCOM-DSCI, was an invaluable opportunity to immerse ...

Researchers reveal OT-specific malware in use and in development

Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient ...

Review of Blackhat EMEA 2024

A review of some interesting briefings and tools found at Blackhat EMEA 2024. The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut. The post Review of Blackhat EMEA 2024 appeared first on Security Boulevard.

Seamless API Threat Detection and Response: Integrating Salt Security and CrowdStrike NG-SIEM

APIs are essential for modern digital business operations, enabling smooth connectivity and data exchange between applications. However, the growing dependence on APIs has unintentionally widened the attack surface, making strong API security a ...

Malvertising on steroids serves Lumma infostealer

A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the ...

Cybersecurity Best Practices for Digital Nomads in Japan

Best cybersecurity tips for digital nomads in Japan: Keep your data safe, avoid cyber threats, and work securely from anywhere in Japan. The post Cybersecurity Best Practices for Digital Nomads in Japan appeared first on Security Boulevard.

Top 5 Cryptographic Key Protection Best Practices

We're sharing top 5 cryptographic key protection best practices. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Zimperium. The post Top 5 Cryptographic Key Protection Best Practices appeared first on Security Boulevard.

RunSafe Security Platform enhances risk management with automation

RunSafe Security has released the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers can generate a high-fidelity software bill of materials (SBOM) at build time, ...