Application Security News and Articles


DEF CON 32 – Manipulating Shim And Office For Code Injection

Authors/Presenters: Ron Ben-Yizhak, David Shandalov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Executive Perspectives, Episode 3, Bobby Mehta

In the latest installment of our Executive Perspectives interview series, Axio CEO Scott Kannry  sat down with Bobby Mehta, the former President & CEO of TransUnion and a sitting board Read More The post Executive Perspectives, Episode 3, ...

Daniel Stori’s Turnoff.US: ‘I Love Windows Powershell’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘I Love Windows Powershell’ appeared first on Security Boulevard.

Metrics That Matter: How Security Professionals Can Show Value

Build a metrics program tailored to your organization’s strategic goals This article was originally published in Security Magazine. Think back to your early days in the security industry. Perhaps, like many others, you spent years in law ...

Clever PayPal-based Attack

Do not call that number! This attack is brilliant. It uses a legitimate PayPal email message about a bogus payment to trick you into phoning a bogus PayPal phone number. I have received several of them this week with various names for the company ...

Comprehensive Risk Analysis: Inversion6 Transforms Client Assessments

Understand how AppOmni’s comprehensive SSPM platform helped Inversion6 face their SaaS security challenges and gained enhanced security insights. The post Comprehensive Risk Analysis: Inversion6 Transforms Client Assessments appeared first on ...

Ten Lessons Learned from The Mother of All Breaches Data Leak

What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data protection, and more. It’s almost been a year since the “Mother of All Breaches” (MOAB), widely known as one of the largest and most impactful data ...

DEF CON 32 – Spies And Bytes: Victory In The Digital Age

Authors/Presenters: General Paul M. Nakasone Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Cybersecurity Insights with Contrast CISO David Lindner | 11/15/24

Insight #1: Two tricks to stop mystery breaches The majority of security leaders reportedly don’t know what caused data security incidents at their organizations over the past 12 months. To reduce the likelihood of unknown security breaches, ...

C-Level Fireside Chat Uncovers the Truth About Data Security’s Hardest Battles

The post C-Level Fireside Chat Uncovers the Truth About Data Security’s Hardest Battles appeared first on Votiro. The post C-Level Fireside Chat Uncovers the Truth About Data Security’s Hardest Battles appeared first on Security Boulevard.

Cybercriminals hijack DNS to build stealth attack networks

Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks ...

Cyber crooks push Android malware via letter

Cyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical letter impersonating MeteoSwiss (i.e., Switzerland’s Federal Office of Meteorology ...

java security best practices

java security best practicesContinue reading on Medium »

Good Essay on the History of Bad Password Policies

Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but that had not been studied scientifically. ...

API Security Day – powered by APIDays & Escape

Join top industry experts at API Security Day, a focused event at APIDays Paris, to explore in-depth strategies and insights for protecting APIs. The post API Security Day – powered by APIDays & Escape appeared first on Security Boulevard.

Palo Alto Networks firewalls, Expedition under attack (CVE-2024-9463, CVE-2024-9465)

Attackers have been spotted exploiting two additional vulnerabilities (CVE-2024-9463, CVE-2024-9465) in Palo Alto Networks’ Expedition firewall configuration migration tool, CISA has confirmed on Thursday. About the vulnerabilities ...

Oscilar Cognitive Identity Intelligence Platform combats AI-powered fraud

Oscilar unveiled its Cognitive Identity Intelligence Platform to combat the rising tide of AI-powered fraud. The platform’s proprietary “Digital & Behavior Identification” technology transforms digital identity verification ...

IBM announces Autonomous Security for Cloud

IBM announced Autonomous Security for Cloud (ASC), an AI-powered solution from IBM Consulting designed to automate cloud security management and decision-making to help mitigate risk for organizations accelerating their cloud journey on Amazon ...

Zero-Day Exploits Surge in 2023, Cisco, Fortinet Vulnerabilities Targeted

A report from the Five Eyes cybersecurity alliance, released by the CISA, highlights the majority of the most exploited vulnerabilities last year were initially zero-day flaws, a significant increase compared to 2022 when less than half of the ...

Bitsight acquires Cybersixgill to help organizations manage cyber exposure

Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack ...