Application Security News and Articles


DEF CON 32 – Sshamble Unexpected Exposures in the Secure Shell

Authors/Presenters: HD Moore, Rob King Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem

Come for the cybersecurity insights, stay for the raclette! Black Alps 2024 packed in Swiss charm with technical talks, a hacker's raclette dinner, and conference-logo chocolates. A perfect mix of threats, treats, and networking. The post Black ...

Your AppSec Journey Demystified: Driving Effective API Security with Wallarm and StackHawk

There is no doubt that attackers have shifted their attention to APIs. Wallarm’s API ThreatStats research identifies that 70% of attacks now target APIs instead of Web Applications. While APIs have become the backbone of innovation and ...

Your Guide to Bad Bots Management

Despite the damage they can deal, most businesses don’t fully protect themselves against bad bots. This guide will give you key strategies for comprehensive bot detection and protection The post Your Guide to Bad Bots Management appeared first ...

Vectra AI adds AI-powered detections to help secure Microsoft customers

Vectra AI announced the extension of the Vectra AI Platform to include comprehensive coverage for customers’ Microsoft Azure environments. With the addition of over 40 unique attacker behavior detections for Microsoft Azure, Vectra AI now ...

Our commitment to you – and an update on severity ratings for software quality

The speed of software development and product delivery is increasing for organizations everywhere – including here at Sonar. In this blog, we decided to put our guiding engineering principles in writing and share them with you. The post Our ...

Cequence Security enables organizations to elevate their API defenses

Cequence Security announced its new API Security Assessment Services. Designed to provide immediate, actionable insights into API security risks, these time-bound and fixed services leverage Cequence’s advanced Unified API Protection platform, ...

Absolute Security releases Enterprise Edition

Absolute Security launched Enterprise Edition, combining the new Safe Connect for Secure Access and Comply Module for Secure Endpoint. With these innovations, Enterprise Edition is the comprehensive Security Service Edge (SSE) that can ensure ...

Sorting the SOC Drawer: How to Tidy Up Cybersecurity Tools

The post Sorting the SOC Drawer: How to Tidy Up Cybersecurity Tools appeared first on Votiro. The post Sorting the SOC Drawer: How to Tidy Up Cybersecurity Tools appeared first on Security Boulevard.

GoIssue phishing tool targets GitHub developer credentials

Researchers discovered GoIssue, a new phishing tool targeting GitHub users, designed to extract email addresses from public profiles and launch mass email attacks. Marketed on a cybercrime forum, GoIssue allows attackers to send bulk emails while ...

Protecting Your Clients During the Holiday Season: A Guide for Family Offices

The holiday season is a time of joy and celebration, but it’s also a prime time for cybercriminals to target high-net-worth individuals. While family offices are constantly focused on protecting their clients’ financial assets and personal ...

Infostealers increasingly impact global security

Check Point Software’s latest threat index reveals a significant rise in infostealers like Lumma Stealer, while mobile malware like Necro continues to pose a significant threat, highlighting the evolving tactics used by cybercriminals across ...

Rakuten Viber unveils new security solutions for businesses

Rakuten Viber has launched new solutions to further protect communication on the platform. Businesses can now quickly authenticate users to enhance trust and reduce fraud, making interactions more secure. Verification messages provide a secure ...

Nirmata Control Hub automates security with policy-as-code

Nirmata launched Nirmata Control Hub, a comprehensive platform designed to prevent misconfigurations and automate security through policy-as-code. As Artificial Intelligence (AI) accelerates the adoption of Kubernetes and cloud-native ...

Aerospace employees targeted with malicious “dream job” offers

It’s not just North Korean hackers who reach out to targets via LinkedIn: since at least September 2023, Iranian threat actor TA455 has been trying to compromise workers in the aerospace industry by impersonating job recruiters on the ...

Cisco introduces Wi-Fi 7 access points to enhance employee and customer experiences

Cisco introduces new intelligent, secure and assured wireless innovations, with smart Wi-Fi 7 access points and unified subscription licensing that can enable smart spaces out-of-the-box. These innovations empower customers to solve for their ...

Syteca Account Discovery strengthens privileged access management

Syteca launched Account Discovery, a new feature within its Privileged Access Management (PAM) solution. This enhancement enables organizations to automatically detect and manage privileged accounts across their IT infrastructure, significantly ...

Bectran adds RSA encryption to protect the transmission of sensitive data

Keeping information secure is both a leading challenge and priority among B2B credit, collections and accounts receivables departments. It requires vigilance against scams like identity theft and hacks that intercept vital business and customer ...

Splunk expands observability portfolio to provide organizations with deeper business context

Splunk announced innovations across its expanded observability portfolio to empower organizations to build a leading observability practice. These product advancements provide ITOps and engineering teams with more options to unify visibility ...

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The compliance variable has come into play in an impactful way. Related: Technology and justice systems The U.S. Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for ...