Application Security News and Articles


Walking the Walk: How Tenable Embraces Its “Secure by Design” Pledge to CISA

As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure by Design" pledge earlier this year. Our embrace of this pledge underscores our commitment to security-first principles and reaffirms our ...

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity

Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape. The post In a Growing Threat Landscape, Companies Must do ...

Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed

A strategic approach to achieving speed without sacrificing protection requires a deliberate focus on application connectivity. The post Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed appeared ...

Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together

A cyber risk assessment is a tool that helps organizations identify and prioritize risks associated with threats that are relevant to their unique environment. The post Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can ...

Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals

‘Tis the week of Black Friday deals, where the excitement of snagging those incredible deals can sometimes overshadow the importance of staying safe online. With cybercriminals on the prowl, it’s crucial to take steps to protect your digital ...

The Cyberthreats from China are Ongoing: U.S. Officials

U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves in ...

Security Analysis of the MERGE Voting Protocol

Interesting analysis: An Internet Voting System Fatally Flawed in Creative New Ways. Abstract: The recently published “MERGE” protocol is designed to be used in the prototype CAC-vote system. The voting kiosk and protocol transmit votes over ...

Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation

Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, and encoding, this ...

Voice Phishing Attacks: How to Prevent and Respond to Them

Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of “voice” and “phishing”, is a fraudulent scheme that aims to trick you into revealing ...

Wireshark 4.4.2: Security updates, bug fixes, updated protocol support

Wireshark, the popular network protocol analyzer, has reached version 4.4.2. It is used for troubleshooting, analysis, development and education. The following vulnerabilities have been fixed: wnpa-sec-2024-14 FiveCo RAP dissector infinite loop. ...

Top 7 Vanta Alternatives to Consider in 2025

The Rise of Compliance-Centric Platforms Vanta was developed to help organizations achieve SOC 2 compliance quickly. Compliance management platforms have gained significant traction in the market. For startups and smaller businesses, these ...

AI Kuru, cybersecurity and quantum computing

As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the day when quantum computers can break current encryption methods). This could compromise the ...

Overcoming legal and organizational challenges in ethical hacking

In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security domains. He explains how AI and machine learning enhance ethical ...

What is CICRA Audit and Why It Matters?

Credit Information Companies (Regulation) Act was introduced in India in 2005. It was for organizations that handle customers’ credit information to promote transparency in the credit system as well as protect sensitive data. CICRA Audit makes ...

Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data ...

Deploy a SOC using Kali Linux in AWS

The Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment is ideal for honing skills in security operations, threat detection, ...

Assessing AI risks before implementation

In this Help Net Security video, Frank Kim, SANS Institute Fellow, explains why more enterprises must consider many challenges before implementing advanced technology in their platforms. Without adequately assessing and understanding the risks ...

DEF CON 32 – A Shadow Librarian: Fighting Back Against Encroaching Capitalism

Authors/Presenters: Daniel Messe Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Introduction to SonarQube: Elevate Your Code Quality and Security

In the fast-paced world of software development, ensuring clean, secure, and maintainable code is paramount. Bugs, vulnerabilities, and…Continue reading on Medium »