Application Security News and Articles


USX Cyber strengthens phishing defense in GUARDIENT XDR

USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training ...

What is Digital Lending Application (DLA) Audit?

Digital lending has emerged as a game-changer, reshaping the borrowing experience with unprecedented speed, convenience, and accessibility. Gone are the days of endless paperwork and prolonged waiting times—now, individuals can secure loans ...

AI’s impact on the future of web application security

In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how ...

Using AI to drive cybersecurity risk scoring systems

In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and ...

Critical vulnerabilities persist in high-risk sectors

Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest vulnerabilities The report, which analyzes data from over 200,000 dynamic ...

New infosec products of the week: November 15, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra. Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory ...

SAST vs. DAST: What’s the Difference and Why It Matters for App Security

by Revel Aldwin (DevSecOps Consultant at ITSEC Asia)Continue reading on Medium »

NIST report on hardware security risks reveals 98 failure scenarios

NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report ...

Palo Alto Networks Issues AI Red Alert

SANTA CLARA, Calif. — With great promise comes potential peril. And while artificial intelligence (AI) is looked upon as a panacea for enterprises, it also poses an existential security threat. “We stand at the intersection of human ...

DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller

Authors/Presenters: Timm Lauser, Jannis Hamborg Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

The Ultimate Guide to Data Masking in SQL Server

If you’re exploring data masking in SQL Server, how can you decide which SQL masking method is right for you? Learn all about your options here. The post The Ultimate Guide to Data Masking in SQL Server appeared first on Security Boulevard.

Generating High Quality Test Data for MySQL Through De-identification and Synthesis

As one of the most popular open-source databases, widely used for web applications, MySQL is no stranger to PII and sensitive data. At the same time, its users need production-like data for effective development and testing. Here are the ...

How to Mask Sensitive Data in Files, from CSV to JSON

Tonic’s file connector is a quick and easy way to get de-identified data to power your development. Simply upload data in files (such as CSV) to detect and mask sensitive data, and then generate new output files for safe, fast use. The post How ...

Business Logic Attacks Target Election-Related Sites on Election Day

As U.S. citizens headed to the polls, cyber threat activity against election-related websites was unusually high. One of the most prominent attack types observed this Election Day was business logic attacks—a complex threat that manipulates the ...

Is SOAR Obsolete?

Let’s look at the factors behind the push to declare the end of SOAR, consider their merits, and determine whether or not SOAR is obsolete. The post Is SOAR Obsolete? appeared first on D3 Security. The post Is SOAR Obsolete? appeared first on ...

How to Defend Non-Human Identities from Infostealers

4 min read The identity layer’s most insidious threat is now setting its sights on a different group of targets. Here's how to be ready. The post How to Defend Non-Human Identities from Infostealers appeared first on Aembit. The post How to ...

Blinded by Silence

Blinded by Silence: How Attackers Disable EDR Overview Endpoint Detection and Response systems (EDRs) are an essential part of modern cybersecurity strategies. EDR solutions gather and analyze data from endpoints to identify suspicious ...

Randall Munroe’s XKCD ‘Geometriphylogenetics’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Geometriphylogenetics’ appeared first on Security Boulevard.

Busting Ransomware’s Billion-Dollar Boom with Network Observability and Security

Ransomware-as-a-service (RaaS) is the first example of a specific threat becoming a financially viable business model. The subscription model approach has propelled ransomware to be one of the most pervasive cyber threats of our time, evolving ...

Who’s Afraid of a Toxic Cloud Trilogy?

The Tenable Cloud Risk Report 2024 reveals that nearly four in 10 organizations have workloads that are publicly exposed, contain a critical vulnerability and have excessive permissions. Here’s what to watch for in your organization. In a ...