Application Security News and Articles


Top Tool Capabilities to Prevent AI-Powered Attacks

Recent advances in AI technologies have granted organizations and individuals alike unprecedented productivity, efficiency, and operational benefits. AI is, without question, the single most exciting emerging technology in the world. However, it ...

Auditing the Ruby ecosystem’s central package repository

This is a joint post with the Ruby Central team. The full report, which includes all of the detailed findings from our security audit of RubyGems.org, can be found here. Ruby Central hired Trail of Bits to complete a security assessment and a ...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

Vienna, Austria, 11th December 2024, CyberNewsWire The post DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet appeared first on Security Boulevard.

New CISA Hardening Guidance Provides Valuable Insights for Network Security Engineers

Recent guidance from CISA and the FBI highlights best practices to monitor and harden network infrastructure. The guidance, published in response to high-profile attacks on telecom infrastructure, is applicable to a wider audience. This blog ...

Understanding and Taking Advantage of the NYDFS Risk Assessment Requirement

As organizations prepare for the coming year those affected by NYDFS may struggle to efficiently include the requirements in their […] The post Understanding and Taking Advantage of the NYDFS Risk Assessment Requirement appeared first on ...

U.K. cybersecurity chief warns of gap between risks and defenses

A warning issued by the new head the United Kingdom's National Cyber Security Centre (NCSC) should be sobering to cybersecurity pros everywhere. Speaking at the agency's headquarters on Tuesday, Richard Horne declared that the cyber-risks faced ...

AMD Chip VM Memory Protections Broken by BadRAM

Researchers in Europe unveil a vulnerability dubbed "BadRAM" that hackers can easily exploit using $10 hardware to bypass protections in AMD's Eypc server processors used in cloud environments and expose sensitive data stored in memory. The post ...

2025 Software Manufacturing Predictions: SBOMs, Regulations, and More

As we head into 2025, experts weigh in on trends affecting software products in the medical, vehicle, and energy sectors. They also talk about manufacturer readiness for the EU Cyber Resilience Act, and other legislation coming their way. Below, ...

The Ultralytics Supply Chain Attack: Connecting the Dots with GitGuardian’s Public Monitoring Data

On December 4, 2024, the Ultralytics Python module was backdoored to deploy a cryptominer. Using GitGuardian’s data, we reconstructed deleted commits, connecting the dots with the initial analysis. This investigation highlights the value of ...

Microsoft enforces defenses preventing NTLM relay attacks

Since making Kerberos the default Windows authentication protocol in 2000, Microsoft has been working on eventually retiring NTLM, its less secure and obsolete counterpart. Until NTLM gets disabled by default, Microsoft is working on shoring up ...

Application Security Testing with SAST: A Key to Secure Development

Application security testing is the key to protecting your enterprise applications.Continue reading on Medium »

BadRAM: $10 hack unlocks AMD encrypted memory

Cybersecurity researchers have identified a vulnerability (CVE-2024-21944, aka BadRAM) affecting ADM processors that can be triggered by rogue memory modules to unlock the chips’ encrypted memory. The SPD chip can be modified using an ...

Top 10 Web Design Security Best Practices to Follow in 2025

This blog explores ten essential web design security practices every developer and business should adopt to stay ahead of potential attacks. The post Top 10 Web Design Security Best Practices to Follow in 2025 appeared first on Security Boulevard.

Ho-Ho-Hold the Scams: Safeguarding Your Employees Against Holiday Phishing Scams

As Christmas is around the corner, even the grinchiest among us can’t ignore that holiday vibe. Christmas songs are playing as we do our grocery shopping, families are planning long-awaited get-togethers, and your employees are (hopefully) ...

Cybersecurity Products or Platforms – Which is More Effective?

Understanding the nuances between cybersecurity products and platforms is crucial for enhancing business protections and supporting businesses anywhere. The post Cybersecurity Products or Platforms – Which is More Effective? appeared first ...

Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025

One of the most significant regulatory mandates on the horizon is the European Union’s Digital Operational Resilience Act (DORA). The post Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025 appeared first ...

Picus provides automated pentesting testing to help uncover critical risks

Picus Security announced new innovations to its Attack Path Validation (APV) product. The new Picus APV now offers security teams accurate, risk-free, and continuous automated penetration testing to uncover critical risks, while significantly ...

Cato Networks extends SASE-based protection to IoT/OT environments

With the introduction of Cato IoT/OT Security, Cato Networks is enabling enterprises to simplify the management and security of Internet of Things (IoT) and operational technology (OT) devices. Cato IoT/OT Security converges device discovery and ...

EASA Part IS

What is EASA? EASA stands for the European Union Aviation Safety Agency. It is a regulatory body established by the European Union to ensure a high and uniform level of safety in civil aviation across Europe. The EASA framework provides a ...