Application Security News and Articles


Space tech giant Maxar confirms attackers accessed employee data

Satellite and space technology leader Maxar Space Systems has suffered a data breach. “Our information security team discovered that a hacker using a Hong Kong-based IP address targeted and accessed a Maxar system containing certain files ...

Cracking the Code: Tackling the Top 5 Cloud Security Challenges

By developing robust, adaptive security strategies, organizations can effectively safeguard their cloud environments against evolving threats and ensure compliance with regulatory requirements. The post Cracking the Code: Tackling the Top 5 Cloud ...

Unlocking the Power and Potential of GenAI in Software Development

As GenAI becomes an indispensable tool in software development, organizations are embracing its ability to drive innovation and streamline operations. But this rapid adoption brings with it significant challenges in security, governance, and ...

Oracle patches exploited Agile PLM vulnerability (CVE-2024-21287)

Oracle has released a security patch for CVE-2024-21287, a remotely exploitable vulnerability in the Oracle Agile PLM Framework that is, according to Tenable researchers, being actively exploited by attackers. About CVE-2024-21287 Oracle Agile ...

Open-Source Security Tools are Free… And Other Lies We Tell Ourselves

The most expensive security tool isn't the one you pay for - it's the one that fails when you need it most. Just ask those 110,000 websites that thought they were saving money. The post Open-Source Security Tools are Free… And Other Lies We ...

Phobos ransomware administrator faces US cybercrime charges

The Justice Department unsealed criminal charges against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptitsyn made his initial appearance in the US District Court ...

Aon Cyber Risk Analyzer helps organizations evaluate cyber risk

Aon launched its Cyber Risk Analyzer, a digital application that allows risk managers to make data-driven, technology-enabled decisions to mitigate cyber risk. The tool is the latest in a series of new offerings, which brings together Aon’s ...

AlmaLinux 9.5 released: Security updates, new packages, and more!

AlmaLinux is a free, open-source, enterprise-grade Linux distribution. Governed and owned by the community, it offers a production-ready platform with binary compatibility to Red Hat Enterprise Linux. AlmaLinux 9.5, codenamed Teal Serval, is now ...

Belden announces products designed to enhance data security

Belden announces new network and data infrastructure products designed for secure, high-quality performance in critical applications. Data orchestration & management Hirschmann EAGLE40-6M Train Firewalls meet the demands of railway rolling ...

Ransomware Evolution: From Triple-Quadruple Extortion to RaaS

In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the wave of digital invasions that the world has been witnessing with an attack occuring every two seconds. From the monetary aspect, a 30% increase in ...

Dev + Sec: A collaborative approach to cybersecurity

The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver features and products quickly with a fast-paced, iterative development ...

Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters

Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters madhav Tue, 11/19/2024 - 05:28 International Fraud Awareness Week (November 17-23) is a critical time to consider the significant risks that fraud poses to ...

Why AI alone can’t protect you from sophisticated email threats

In this Help Net Security interview, Riaz Lakhani, CISO at Barracuda Networks, discusses the effectiveness of AI-based behavioural analysis in combating sophisticated email threats like BEC and VEC. Lakhani also explains how AI tools help detect ...

Open-source and free Android password managers that prioritize your privacy

We’re often told to use strong, unique passwords, especially for important accounts like email, banking, and social media. However, managing different passwords for numerous accounts can be challenging. Password managers simplify this by ...

Barracuda Networks Report Sees Sextortion Becoming More Personalized

A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased. The post Barracuda Networks Report Sees Sextortion Becoming More Personalized appeared first on Security ...

Google report shows CISOs must embrace change to stay secure

Google’s latest report, conducted in partnership with Hypothesis Group, reveals a stark reality for organizations: incremental security measures are no longer sufficient. The study, involving over 2,000 decision-makers across the US, UK, ...

Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces ...

Ace AI: Generate Playbooks with Built-In Expertise Across Every Relevant Domain

Your AI dream team awaits. Ace AI automates expert security playbooks in hours, not weeks. Save time, enhance security, and take control. The post Ace AI: Generate Playbooks with Built-In Expertise Across Every Relevant Domain appeared first on ...

ASPM vs. CSPM: Key Differences

With dozens of cybersecurity threats out there, maintaining your company’s security posture is more important than ever. And with so many types of technology to oversee—from cloud infrastructure to AI-generated code—there are just as many ...

Compliance Automation: How to Get Started and Best Practices

Managing compliance manually is an uphill battle, especially when regulatory requirements are constantly changing. The post Compliance Automation: How to Get Started and Best Practices appeared first on Security Boulevard.