Application Security News and Articles


Arctic Wolf acquires BlackBerry’s Cylance endpoint security assets

Arctic Wolf and BlackBerry announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of ...

Kali Linux 2024.4 released! 14 new shiny tools added

Kali Linux 2024.4 includes a broad set of updates and changes. The summary of the changelog since the 2024.3 release from September: Python 3.12 – New default Python version (Au revoir pip, hello pipx). The end of the i386 kernel and images ...

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

Continuing our look back at 2024, part two of Last Watchdog’s year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and ...

The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s plan calls for integrated cyber defense across borders, addressing ...

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage madhav Tue, 12/17/2024 - 05:10 Cybersecurity is a remarkably dynamic industry. New trends, technologies, and techniques reshape the landscape at an ...

Balancing security and user experience to improve fraud prevention strategies

In this Help Net Security interview, Jennifer White, Senior Director for Banking and Payments Intelligence at J.D. Power, discusses how financial institutions can improve customer satisfaction during fraud resolution, covering proactive fraud ...

Cybersecurity jobs available right now: December 17, 2024

CISO ONE Security | Israel | Hybrid – View job details As a CISO, you will be responsible for overseeing information security, cybersecurity, application security, and business continuity strategies. The role involves implementing ...

FakeCaptcha scams—When the “I’m not a robot” button is a trap

How many times you’ve clicked the “I’m not a robot” CAPTCHA checkbox without a second thought? We’ve all done it … countless times. It’s such a familiar step that we don’t question it. And, cybercriminals have taken note of ...

An easy to follow NIST Compliance Checklist

We have seen how cyber attacks have disrupted organisations and businesses repeatedly. Mitigating emerging threats is crucial more than ever, and many organisations are at the forefront of combating them. One such organisation is the National ...

10 telltale signs of a fake giveaway on social media

Who wants a free phone or gift cards? Perhaps a free vacation? It’s easy to understand the allure of giveaways on social media. But here's the catch: not all giveaways are real. Fake giveaways are one of the many traps scammers use to steal ...

How to Retain Your GSOC’s Most Valuable Asset: Employees

Hiring and retaining top talent ensures your GSOC continues to play a vital role as a strategic contributor to company operations After over forty years in the industry, the one thing I’ve learned is that tragedy forces change.  For example, ...

PCI DSS 4.0 Client-Side Security Requirements: Experts Address Urgent Compliance Deadline

With less than four months until the compliance deadline for new eSkimming security controls in PCI DSS, Source Defense, a pioneer in client-side security, hosted a critical roundtable discussion featuring leading Qualified Security Assessors ...

Feel Relieved with Advanced Secrets Rotation Practices

Why is Secrets Rotation Integral to Your Cybersecurity Strategy? In an age where data breaches are all too common, ensuring the security of Non-Human Identities (NHIs) and the management of their secrets is more important than ever. If left ...

Innovations in Machine Identity Management for the Cloud

Are We Overlooking Machine Identity Management in Cloud Security? As businesses continually shift their operations to the cloud, the prospect of security becomes increasingly vital. To ensure complete cloud security control, the management of ...

Ensuring a Safe Digital Environment with Robust PAM

Can Robust Privileged Access Management (PAM) Secure our Digital Environment? Data breaches and cyber threats are increasingly prevalent in today’s fast-paced digital landscape, making robust privileged access management (PAM) strategies a ...

Stay Calm: Techniques to Manage Secrets Sprawl Effectively

Are You Ready to Manage Secrets Sprawl Effectively? One particular challenge that requires nerves of steel is managing secrets sprawl. This phenomenon occurs when sensitive data like encrypted passwords, tokens, or keys (the “Secrets”) used ...

When & Why to Hand Over the Keys to Your Kubernetes Infrastructure

In the constantly maturing landscape of cloud-native technologies, Kubernetes reigns as the de facto standard for container orchestration. However, managing Kubernetes infrastructure can be a complex and resource-intensive task, particularly if ...

Serbian government used Cellebrite to unlock phones, install spyware

Serbian police and intelligence officers used Cellebrite forensic extraction software to unlock journalists’ and activists’ phones and install previously unknown Android spyware called NoviSpy, a new Amnesty International report ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #316 – Simplicity

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Shielding Your Storefront: How SASE Protects Retailers in a Digital Age

SASE offers a comprehensive and scalable security solution that protects your data, safeguards your customers and empowers you to thrive in the digital age. The post Shielding Your Storefront: How SASE Protects Retailers in a Digital Age appeared ...