Application Security News and Articles


Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense

The road to cyber preparedness begins with studying organizations’ own vulnerabilities - and doing it often so that nothing escapes notice – rather than obsessing about the perils that live outside. The post Sealing Entry Points and Weak ...

CISOs in 2025: Balancing security, compliance, and accountability

In this Help Net Security interview, Daniel Schwalbe, CISO at DomainTools, discusses the intensifying regulatory demands that have reshaped CISO accountability and daily decision-making. He outlines the skill sets future CISOs need, their key ...

Cyber professionals face an IP loss reckoning in 2025

AI can expose your work secrets. The same goes for AI-generated content, which has revolutionized workplace productivity but comes with hidden risks. As more employees use AI models to streamline tasks—whether drafting reports, building code, ...

Tips for a successful cybersecurity job interview

Whether you’re looking to enhance your existing cybersecurity skills or just beginning your journey in the field, cybersecurity offers a wide range of career opportunities. If you’re considering a career shift, exploring new job ...

Social engineering scams sweep through financial institutions

North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams now represent 23% of all digital banking fraud. Growing danger of ...

Patch Tuesday Update – November 2024

The post Patch Tuesday Update - November 2024 appeared first on Digital Defense. The post Patch Tuesday Update – November 2024 appeared first on Security Boulevard.

6 Ways to Save Money on CMMC Costs

The DoD’s CMMC Final Rule becomes effective on December 16, 2024, and requires organizations who handle CUI to achieve CMMC Level 2 Certification, which will require an independent assessment every 3 years by a C3PAO (CMMC Third Party ...

Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)

November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited ...

DEF CON 32 – The Hack, The Crash And Two Smoking Barrels

Authors/Presenters: Thomas Sermpinis Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Context is King: Using API Sessions for Security Context

There’s no doubt that API security is a hot topic these days. The continued growth in API-related breaches and increase in publicized API vulnerabilities has pushed API security to the top of CISO’s lists. The tools in the market for API ...

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

4Critical 82Important 1Moderate 0Low Microsoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in ...

Randall Munroe’s XKCD ‘Proterozoic Rocks’

Permalink The post Randall Munroe’s XKCD ‘Proterozoic Rocks’ appeared first on Security Boulevard.

Scaling Global Protection: DataDome Expands to Over 30 Points of Presence (PoP) Worldwide

DataDome's point of presence (PoP) network has expanded to over 30 locations worldwide, delivering seamless, fast protection to our customers across the globe. The post Scaling Global Protection: DataDome Expands to Over 30 Points of Presence ...

Is the latest book on “Pentesting APIs” any good?

Let's explore the latest book by Packt Publishing on "Pentesting APIs" and see if it's worth putting on an API hacker's bookshelf. The post Is the latest book on “Pentesting APIs” any good? appeared first on Dana Epp's Blog. The post Is the ...

Infostealer Malware: An Introduction

Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of ...

Fake IP checker utilities on npm are crypto stealers

Recently identified npm packages called "node-request-ip", "request-ip-check" and "request-ip-validator" impersonate handy open source utilities relied upon by developers to retrieve an external IP address but instead target Windows, Linux and ...

DEF CON 32 – Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows

Authors/Presenters: Samy Kamkar Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Explore Tidal Cyber with our Demo Video Library

Are you interested in digging a little deeper into how Tidal Cyber works? Our video library of brief demo tours shows how Tidal Cyber empowers security teams with Threat-Informed Defense. Each video dives into a different aspect of Tidal Cyber ...

ARMO selected by Orange Business to Secure its Managed Kubernetes Services

We’re honored to share a new partnership with Orange Business (Norway), a global leader in digital services. ARMO The post ARMO selected by Orange Business to Secure its Managed Kubernetes Services appeared first on ARMO. The post ARMO selected ...

BlackFog platform enhancements boost data loss prevention

BlackFog launched its next generation enterprise platform to deliver even more powerful ransomware and insider threat prevention. BlackFog’s pioneering platform focuses specifically on anti data exfiltration to prevent unauthorized data from ...