Application Security News and Articles


Best Practices for Machine Identity Management

Why is Machine Identity Management Essential in Today’s Cybersecurity Landscape? Machine Identity Management has become a crucial element in today’s cybersecurity landscape. As organizations increasingly rely on cloud environments, the need ...

Qualys DAST: Key Features and Alternatives

Explore the key features of Qualys DAST, its web application security capabilities, potential limitations, and alternative DAST solutions. The post Qualys DAST: Key Features and Alternatives appeared first on Security Boulevard.

Lest We Forget: United States National Pearl Harbor Remembrance Day, In Memoriam: The 2,403

On August 23, 1994, the United States Congress, by Public Law 103–308, 108 Statute 1169, designated December 7th of each year as National Pearl Harbor Remembrance Day. On November 29th, President Bill Clinton issued a proclamation declaring ...

gosec: A Simple Way to Secure Your Go Projects

In this blog, we’ll explore gosec, a static analysis tool for securing your Go projects. We’ll cover its installation, the rules it…Continue reading on Medium »

gosec: A Simple Way to Secure Your Go Projects

In this blog, we’ll explore gosec, a static analysis tool for securing your Go projects. We’ll cover its installation, the rules it…Continue reading on Medium »

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device

Fifteen years ago I blogged about a different SQUID. Here’s an update: Fleeing drivers are a common problem for law enforcement. They just won’t stop unless persuaded­—persuaded by bullets, barriers, spikes, or snares. Each option is ...

How Secure Vaulting Keeps Your Secrets Safe

Why is Secrets Vaulting Essential for Data Security? As organizations increasingly adopt cloud technology and automation across various industries, securing Non-Human Identities (NHIs) and their secrets has emerged as a crucial element in the ...

Exploring the Future of Cloud-Native Security Solutions

Are We Fully Aware of the Cybersecurity Threats We Face in the Cloud? In today’s interconnected world, maintaining a secure environment is paramount. The advent of the cloud has expanded the horizon of potential threats, as it has given rise to ...

Emerging Ransomware Group Termite Claims Attack on Blue Yonder

Termite, an emerging ransomware group that launched its data leak site in late October and appears to be using a modified version of the Babuk malware, is claiming responsibility for the hack of giant SaaS provider Blue Yonder late last month ...

Attention CISOs: The New EU PLD Product Liability Directive Is Effective Now – Compliance and Cybersecurity Readiness Required

The European Union’s updated Product Liability Directive (PLD) takes effect this month, with a transition period through December 9, 2026. This update substantially changes how product liability applies to digital products sold in the EU. For ...

DEF CON 32 – Encrypted Newspaper Ads In The 19th Century

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Daniel Stori’s Turnoff.US: ‘Super Power’

via the inimitable Daniel Stori at Turnoff.US!! Permalink The post Daniel Stori’s Turnoff.US: ‘Super Power’ appeared first on Security Boulevard.

Stoli Vodka: Bankrupt After Ransomware Attack

Absolutely un-fabulous: Smells like Russia is responsible, but reality is a bit more complicated. The post Stoli Vodka: Bankrupt After Ransomware Attack appeared first on Security Boulevard.

5 Cyber Risk Predictions That Will Define 2025

The cyber landscape is evolving rapidly with new opportunities and threats branching off of every new technological breakthrough. From operational resilience to leadership structures, the decisions IT leaders make today Read More The post 5 Cyber ...

Compromised ultralytics PyPI package delivers crypto coinminer

Executive Summary On December 4, a malicious version 8.3.41 of the popular AI library ultralytics — which has almost 60 million downloads — was published to the Python Package Index (PyPI) package repository. The package contained downloader ...

DEF CON 32 – DC101 – Panel

Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. ...

Implementing FIDO2 Authentication: A Developer’s Step-by-Step Guide

Discover the essentials of FIDO2 authentication implementation in this developer-focused guide. We'll walk you through the process step-by-step, covering key concepts, best practices, and code examples to help you integrate secure, passwordless ...

Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks

Don’t miss the Linux Foundation’s deep dive into open source software security. Plus, cyber agencies warn about China-backed cyber espionage campaign targeting telecom data. Meanwhile, a study shows the weight of security considerations in ...

Cybersecurity Insights with Contrast CISO David Lindner | 12/06/24

Insight #1: The NIST CVE backlog is hogtying CISOs The NIST CVE backlog is a digital plague crippling a critical control layer in an organization's cybersecurity architecture. CISOs and security leaders are left scrambling, their defenses ...

Introducing Private Locations: Securely Scan Your Internal Applications

Secure your internal applications with Escape’s Private Locations. Scan behind firewalls or VPNs using Repeater—no exposure, no compromises. The post Introducing Private Locations: Securely Scan Your Internal Applications appeared first on ...