Application Security News and Articles


IATA Cyber Regulations

The International Air Transport Association (IATA) Cyber Security Regulations represent a set of guidelines and standards aimed at enhancing cybersecurity resilience within the aviation industry. These regulations are critical for ensuring the ...

Trellix Drive Encryption enhances security against insider attacks

Trellix announced Trellix Drive Encryption upgrades for on-premises and SaaS management. Customers benefit from the flexibility needed for encryption protection deployment to safeguard their data and devices from unauthorized access. “The ...

CyTwist’s detection engine combats AI-generated malware

CyTwist launches its patented detection engine to combat the insidious rise of AI-generated malware. Enhancing an organization’s existing security stack, CyTwist’s solution profiles threat actors using field-proven counterintelligence ...

SOC 2 Policies: What They Should Include and Why They Matter

Learn how SOC 2 policies safeguard data, ensure compliance, and simplify the audit process for your business. The post SOC 2 Policies: What They Should Include and Why They Matter appeared first on Scytale. The post SOC 2 Policies: What They ...

Open source malware up 200% since 2023

Sonatype’s 2024 Open Source Malware Threat Report reveals that the number of malicious packages has surpassed 778,500 since tracking began in 2019. In 2024, researchers examined how threat actors leverage malicious open-source packages to ...

Why crisis simulations fail and how to fix them

In this Help Net Security interview, Allison Ritter, Head of Cyber Experiential Exercising at Cyberbit, shares her insights on the key differences between in-person and virtual cyber crisis simulations and what makes each approach effective. ...

Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and ...

Patch Tuesday Update – December 2024

In this Patch Tuesday edition, Microsoft addressed 72 CVEs, including 1 Zero-Day, 16 Criticals, 54 Important and 1 Moderate—the one Zero-Day was found to be actively exploited in the wild. From an Impact perspective, Escalation of Privilege ...

Staying Ahead: The Role of NHIDR in Modern Cybersecurity

Why is NHIDR Crucial in Modern Cybersecurity? For organizations to stay ahead in this dynamic cybersecurity landscape, it’s imperative to embrace innovative and comprehensive security methodologies. One such methodology is Non-Human Identity ...

Microsoft Patch Tuesday 2024 Year in Review

Microsoft addressed over 1000 CVEs as part of Patch Tuesday releases in 2024, including 22 zero-day vulnerabilities. Background Microsoft’s Patch Tuesday, a monthly release of software patches for Microsoft products, has just celebrated its ...

Post-Quantum Cryptography: The Implications of Google’s Willow and Other Quantum Computers for Cybersecurity

Quantum computing was long considered to be part of a distant future. However, it is quickly becoming a reality. Google’s recent announcement of its Willow quantum computing chip is a breakthrough generating significant media attention and ...

Why software composition analysis is essential for open source security

Open source software security and dependency management have never been more critical, as organizations strive to protect their software supply chains while navigating increasing complexity and risks. The post Why software composition analysis is ...

Microsoft fixes exploited zero-day (CVE-2024-49138)

On December 2024 Patch Tuesday, Microsoft resolved 71 vulnerabilities in a variety of its products, including a zero-day (CVE-2024-49138) that’s been exploited by attackers in the wild to execute code with higher privileges. CVE-2024-49138 ...

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks

The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims ...

Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down

SpartanWarrioz, whose prolific phishing kit business took a hit when the group's Telegram channel was shut down in November, is rebounding quickly, creating a new channel and courting former subscribers as it rebuilds its operations, Forta ...

Discover the Benefits of Cloud Monitor’s Advanced Cloud Security

In today’s digital classroom, connectivity is key—but it comes with challenges. As technology becomes an integral part of teaching and learning, K-12 schools face the responsibility of supporting classroom technology while safeguarding ...

DEF CON 32 – Changing Global Threat Landscape

Authors/Presenters: Rob Joyce, The Dark Tangent Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Auguria Streamlines Management of Security Log Data

Auguria today at the Black Hat Europe conference, in addition to providing five additional integrations with other platforms, revealed it has added an explainability graph capability that makes it simple to understand why log data collected is ...

Microsoft’s December 2024 Patch Tuesday Addresses 70 CVEs (CVE-2024-49138)

16Critical 54Important 0Moderate 0Low Microsoft addresses 70 CVEs with 16 rated critical, including one zero-day that was exploited in the wild. Microsoft patched 70 CVEs in its December 2024 Patch Tuesday release, with 16 rated critical, and 54 ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #315 – Stickies

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! The post Comic Agilé – Mikkel Noe-Nygaard, Luxshan ...