Application Security News and Articles


Cleo patches zero-day exploited by ransomware gang

Cleo has released a security patch to address the critical vulnerability that started getting exploited while still a zero-day to breach internet-facing Cleo Harmony, VLTrader, and LexiCom instances. Version 5.8.0.24 of the three products, which ...

Why Your Code Shouldn’t Be Like a Party with the Door Wide Open: DevSecOps 101

If your code isn’t secure, you’re basically hosting a party with the door wide open.Continue reading on Medium »

What’s New in CodeSonar 8.3

CodeSonar 8.3 is a significant upgrade, containing new features and integrations, improved compiler and language support, and more checkers. The highlights are listed below; for more complete details, please consult the Release Notes. We ...

A Year in Data Security: Five Things We’ve Learned From 2024

As the dust settles on another hectic 12 months, business and IT leaders should enjoy a well-earned break. But not for long. The end of one year offers a fantastic vantage point from which to view the macro trends that may go on to shape the ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating the Financially Motivated ...

Shielded on All Sides: How Company Executives Can Mitigate Virtual Kidnapping Schemes

Nisos Shielded on All Sides: How Company Executives Can Mitigate Virtual Kidnapping Schemes Virtual kidnapping, or virtual kidnapping for ransom, is a coercive telephonic scheme used to extort ransom payments from victims... The post Shielded on ...

How Much Will Cybercrime Cost Your E-Commerce Business This Season?

The 2024 holiday season has seen explosive growth in e-commerce, with transaction volumes more than doubling from 5.1 billion in 2023 to 10.4 billion this year. While this highlights the strength of online shopping, it also points to a parallel ...

Enhancing Healthcare with Cloud Tech Without Compromising Security

The post Enhancing Healthcare with Cloud Tech Without Compromising Security appeared first on Votiro. The post Enhancing Healthcare with Cloud Tech Without Compromising Security appeared first on Security Boulevard.

A Critical Guide to PCI Compliance

A Critical Guide to PCI Compliance madhav Thu, 12/12/2024 - 13:28 You are shopping online, adding items to your cart, and you're ready to pay with your credit card. You expect that when you hit "Checkout," your payment details will be safe. ...

The state of AppSec tooling: 4 ways to step up to modern software security

Traditional application security testing (AST) tools are out of step with modern development and AppSec practices. In the age of cloud-native architectures, continuous integration/continuous deployment (CI/CD) models, microservices, and ...

Charity Scams During the Holidays: How to Verify Legitimate Charities

The holiday season is a time of giving and generosity, but it’s also a prime time for scammers to take advantage of people’s goodwill. According to the FBI, charity scams increase significantly during the holidays as criminals look to exploit ...

Top 10 dmarcian Alternatives: Features, Pricing, Pros, and Cons

Searching for dmarcian alternatives? Explore the top DMARC management tools, compare features and pricing, and choose the best solution for your email security needs. The post Top 10 dmarcian Alternatives: Features, Pricing, Pros, and Cons ...

Krispy Kreme cybersecurity incident disrupts online ordering

Popular US doughnut chain Krispy Kreme has been having trouble with its online ordering system as well as digital payments at their brick-and-mortar shops since late November, and now we finally know why: an 8-K report filed with the US ...

Top 5 CMMC Services MSPs Should Offer

CMMC is a rigorous framework designed to enhance the security of the Department of Defense (DoD) supply chain. But while CMMC is essential, it can be challenging and resource-intensive.  This is especially true for SMBs. Small businesses are the ...

27 DDoS-for hire platforms seized by law enforcement

As part of an ongoing international crackdown known as Operation PowerOFF, international law enforcement has seized over two dozen platforms used to carry out Distributed Denial-of-Service (DDoS) attacks. These “booter” (aka ...

PEC “invoice scam” – Stealing time, money, and trust from businesses

PEC stands for “Posta Elettronica Certificata” - a type of legally binding “certified email” used in Italy. It's also a hub of abuse targeting business owners. In this article, we share a real-life case of criminals stealing PEC ...

We must adjust expectations for the CISO role

Cybersecurity has become one of the most high-stakes facets of business operations in the past few years. The chief information security officer (CISO) role, once a back-office function primarily focused on technical oversight, has moved squarely ...

Jetico Search locates and manages sensitive data

Jetico launches Search, a PII and sensitive data discovery tool integrated with BCWipe to locate and securely erase files beyond forensic recovery. Addressing the growing demand for effective solutions in data protection, Search integrates ...

Citrix acquires deviceTRUST and Strong Network

With the widespread adoption of hybrid work models, where teams operate across geographical regions on managed and unmanaged devices, every connection and endpoint presents a potential security risk. Addressing this challenge, Citrix announced ...

Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to ...