Application Security News and Articles


The limits of AI-based deepfake detection

In this Help Net Security interview, Ben Colman, CEO of Reality Defender, discusses the challenges of detecting high-quality deepfakes in real-world applications. He addresses the effectiveness and limitations of watermarking, AI-based detection, ...

Why the NIS2 Directive causes growing pains for businesses

In this Help Net Security video, Dror Liwer, co-founder of Coro, discusses how the EU’s NIS2, its latest security directive for businesses, officially became enforceable recently. This means EU companies face more demanding requirements for ...

Cybercriminals turn to pen testers to test ransomware efficiency

Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate ...

Deepfake attacks occur every five minutes

As cybercriminals continue to adapt their techniques to find new ways through defenses, AI-assisted fraud is growing increasingly sophisticated and frequent, according to Entrust. The findings reveal a deepfake attack happened every five minutes ...

New infosec products of the week: November 22, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Aon, Arkose Labs, HiddenLayer, Hornetsecurity, Radware, and Tanium. Arkose Device ID detects suspicious activity patterns By adding Arkose Device ID to ...

What is DSPT Compliance: From Toolkit to Audit (2024)

The Data Security and Protection Toolkit (DSPT), an online tool, is undergoing significant changes. From September 2024, the DSPT will now align with the National Cyber Security Centre’s Cyber Assessment Framework (CAF) to enhance cybersecurity ...

Genetic Algorithms: Using Natural Selection to Block Bot Traffic

Learn how DataDome uses genetic algorithms, an AI technique inspired by natural selection, to create rules for blocking bot traffic. The post Genetic Algorithms: Using Natural Selection to Block Bot Traffic appeared first on Security Boulevard.

What Is FedRAMP ATO? Designations, Terms, and Updates

As a cloud service provider (CSP), working with federal agencies may be one of your goals. But to do so, you need to meet rigorous security standards from the Federal Risk and Authorization Management Program (FedRAMP). The post What Is FedRAMP ...

7 Best AI Cybersecurity Tools for Your Company

With advanced AI cybersecurity tools, you bring powerful capabilities to your security strategy. AI enhances threat detection, automates key security tasks, and strengthens your overall security posture, completing tasks with speed and accuracy ...

DEF CON 32 – Unlocking The Gates: Hacking A Secure Industrial Remote Access Solution

Authors/Presenters: Moritz Abrell Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Navigating Certificate Lifecycle Management

Managing digital certificates might sound simple, but for most organizations, it’s anything but. For cryptography and IT teams handling hundreds of certificates, staying ahead of expirations, maintaining security, and meeting compliance demands ...

Daniel Stori’s Turnoff.US: ‘My Adorable Useless Code’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘My Adorable Useless Code’ appeared first on Security Boulevard.

Here’s Yet Another D-Link RCE That Won’t be Fixed

D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear. The post Here’s Yet Another D-Link RCE That Won’t be Fixed appeared first on Security Boulevard.

Securing the Foundation: The Critical Role of Hardware in Supply Chain Attacks

As enterprises increasingly focus on supply chain security, a critical yet often overlooked element remains: hardware security. Many organizations fail to address the risks associated with underlying hardware, either due to misconceptions or the ...

BTS #42 – The China Threat

In this episode, Paul Asadoorian, Allan Alford, and Josh Corman discuss the growing threat posed by China, particularly in the context of cyber operations and geopolitical ambitions. They explore the implications of China’s strategies, the ...

Why RBAC is Still a Big Deal in 2024

For many experts, the verdict is that RBAC remains a big deal because it delivers on two crucial fronts: It keeps organizations secure while enabling them to remain agile and innovative. In an era of increasingly sophisticated cyberattacks, ...

Active Directory Under Attack: Five Eyes Guidance Targets Crucial Security Gaps

A landmark global report from cybersecurity agencies emphasizes 17 attack techniques against Microsoft Active Directory and cautions organizations to step up protections. In the first of our two-part series, we offer five steps you can take today ...

Five Cyber Agencies Sound Alarm About Active Directory Attacks: Beyond the Basics

A landmark global report emphasizes 17 attack techniques against Microsoft Active Directory and cautions organizations to step up protections. In the second of our two-part series, we take you beyond the basics to highlight three key areas to ...

US charges five alleged members of Scattered Spider gang

Law enforcement unsealed criminal charges against five alleged members of Scattered Spider, who allegedly targeted employees of companies nationwide with phishing text messages and then used the harvested employee credentials to log in and steal ...

DEF CON 32 – Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities

Authors/Presenters: # Vikas Khanna Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...