Application Security News and Articles


Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’

Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed "Operation Serengeti" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 people were arrested and more than ...

Cybercriminals used a gaming engine to create undetectable malware loader

Threat actors are using an ingenious new way for covertly delivering malware to a wide variety of operating systems and platforms: they have created a malware loader that uses Godot Engine, an open-source game engine. The loader – dubbed ...

ESET researchers analyze first UEFI bootkit for Linux systems

ESET Research has discovered the first UEFI bootkit designed for Linux systems, named Bootkitty by its creators. Researchers believe this bootkit is likely an initial proof of concept, and based on ESET telemetry, it has not been deployed in the ...

Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

Exabeam has allied with Wiz to gain access to security data collected from a cloud-native application protection platform (CNAPP). The post Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform appeared first on Security Boulevard.

Protecting Web-Based Work: Connecting People, Web Browsers and Security

With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions. The post Protecting Web-Based Work: Connecting People, Web Browsers and ...

QScanner: Linux command-line utility for scanning container images, conducting SCA

QScanner is a Linux command-line utility tailored for scanning container images and performing Software Composition Analysis (SCA). It is compatible with diverse container orchestration systems, container runtimes, and operating systems. QScanner ...

Choosing the right secure messaging app for your organization

In this Help Net Security interview, Liad Shnell, CTO at Rakuten Viber, discusses what organizations should look for in secure messaging apps, including encryption, privacy standards, and ease of integration. Shnell also covers the need for a ...

Zero-day data security

In this Help Net Security video, Carl Froggett, CIO of Deep Instinct, discusses the complexities of modern cloud architectures and why current defenses are falling short. He talks about the rise of zero-day data security and the need for ...

Supply chain managers underestimate cybersecurity risks in warehouses

32% of warehouse respondents report that social engineering is one of the most-used entry points in warehouse cyberattacks – tied with software vulnerabilities (32%) and followed by devices (19%), according to Ivanti. Cyberattacks on warehouses ...

Hottest cybersecurity open-source tools of the month: November 2024

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. ScubaGear ScubaGear is an open-source tool the Cybersecurity and Infrastructure ...

AWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp

AWS re:Invent 2024 is next week, right after a late Thanksgiving when we’re kicking off the last few weeks of a busy year. For many organizations, now is the time to review costs and plan budgets. For many, that means taking a hard look at ...

Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update

As the cybersecurity landscape changes and threats evolve, the Department of Defense (DoD) has updated its Enterprise DevSecOps Fundamentals to align development practices with security imperatives further. This is part of a long-term effort by ...

DEF CON 32 – Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel

Authors/Presenters: Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

SAST, DAST e SCA: O Tripé da Segurança de Aplicações Modernas

Em um mundo onde a cibersegurança se torna cada vez mais crítica, desenvolver aplicações seguras deixou de ser um diferencial e se tornou…Continue reading on Medium »

Randall Munroe’s XKCD ‘D Combinatorics’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘D Combinatorics’ appeared first on Security Boulevard.

Why you should stay “professionally detached” from the vulns you find

Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research. The post Why you should stay “professionally detached” from the vulns you find appeared first on Dana Epp's ...

DEF CON 32 – The Rise and Fall of Binary Exploitation

Authors/Presenters: Stephen Sims Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were ...

Researchers reveal exploitable flaws in corporate VPN clients

Researchers have discovered vulnerabilities in the update process of Palo Alto Networks (CVE-2024-5921) and SonicWall (CVE-2024-29014) corporate VPN clients that could be exploited to remotely execute code on users’ devices. CVE-2024-5921 ...

The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore

Discover key highlights from Tanya Janca's talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle. The post The Elephant in AppSec Talks Highlight: Shifting Left ...