Application Security News and Articles


Terrifying Trends in the 2024 Cyber Threat Landscape

The 2024 cyber threat landscape highlights the growing sophistication of bots, with anti-detect browsers and automated attacks enhanced by the emergence of AI tools. The post Terrifying Trends in the 2024 Cyber Threat Landscape appeared first on ...

Safeguarding Cyber Insurance Policies With Security Awareness Training

With cybersecurity threats continuing to evolve at an accelerated pace, organizations need to ensure that their cyber insurance policies remain active at all times. The post Safeguarding Cyber Insurance Policies With Security Awareness Training ...

Roger Grimes on Prioritizing Cybersecurity Advice

This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists of threats, and so on, that are not ranked for ...

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was just starting my investigation into root cause analysis. ...

The AI Paradox in Digital Identity: Why More Security Might Mean Less Privacy (And What to Do About It)

The AI revolution in digital identity brings unprecedented security but at what cost? As AI systems become more sophisticated in protecting our digital lives, they require increasingly intimate access to our personal data, creating a critical ...

Small Businesses Boosting Cybersecurity as Threats Grow: ITRC

A report by the Identity Theft Resource Center found that while the number of small businesses hit by a cyberattack and the amount of losses continues to grow, companies are adopting stronger security best practices and investing more in security ...

DEF CON 32 – AppSec Village – Gridlock The Dual Edged Sword of EV and Solar APIs in Grid Security

Authors/Presenters:Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

SmokeBuster: Keeping Systems SmokeLoader Free

IntroductionIn May 2024, international law enforcement agencies, in collaboration with private industry partners (including Zscaler ThreatLabz), conducted Operation Endgame, disrupting many prominent malware loaders including Smoke (a.k.a. ...

Sophos mounted counter-offensive operation to foil Chinese attackers

Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. Espionage campaigns tied to Chinese ...

CJIS v5.9.5

What is CJIS (v5.9.5)? The Criminal Justice Information Services (CJIS) Security Policy v5.9.5 is a comprehensive security framework established by the Federal Bureau of Investigation (FBI). It sets standards for safeguarding and managing ...

Defending Democracy From Cyber Attacks in 2024

Cyberattacks during the 2016 U.S. presidential election exposed vulnerabilities in voter databases across 21 states, marking a stark warning about the fragility of our electoral systems. The post Defending Democracy From Cyber Attacks in 2024 ...

Cequence Achieves Prestigious AWS Retail Competency Status

Today’s businesses are increasingly cloud-forward and becoming more agile than ever, and the retail vertical in particular has embraced this digital transformation. Amazon Web Services (AWS) and Cequence have partnered to offer a unique set of ...

Google on scaling differential privacy across nearly three billion devices

In this Help Net Security interview, Miguel Guevara, Product Manager, Privacy Safety and Security at Google, discusses the complexities involved in scaling differential privacy technology across large systems. He emphasizes the need to develop ...

Fuzzing between the lines in popular barcode software

By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already been extensively ...

Strata Identity to Host a CSA CloudBytes Webinar on Achieving Zero Trust Identity with the Seven A’s of IAM

Session will present a comprehensive framework for managing identity to strengthen security, compliance, and application continuity BOULDER, Colo., Oct. 31, 2024—Strata Identity, the Identity Orchestration company, today announced it will host ...

Cybersecurity Awareness Month: AI vs. AI: Redefining Zero Trust

Author: Brian Deitch, Chief Technology Evangelist, Zscaler The rise of artificial intelligence isn’t just about automating some mundane processes or […] The post Cybersecurity Awareness Month: AI vs. AI: Redefining Zero Trust appeared first ...

Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety

The post Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety appeared first on Votiro. The post Cybersecurity Awareness Month: Exposing 6 Myths That Threaten Digital Safety appeared first on Security Boulevard.

Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups

A supply chain compromise involving Lottie Player, a widely used web component for playing site and app animations, has made popular decentralized finance apps show pop-ups urging users to connect their wallets, TradingView has reported. The ...

Runtime context: the missing piece in Kubernetes security

Originally appeared on The New Stack. More and more organizations rely on Kubernetes to deploy and manage their applications. However, The post Runtime context: the missing piece in Kubernetes security appeared first on ARMO. The post Runtime ...

dope.security Embeds LLM in CASB to Improve Data Security

dope.security this week added a cloud access security broker (CASB) to its portfolio that identifies any externally shared file and leverages a large language model (LLM) to identify sensitive data. The post dope.security Embeds LLM in CASB to ...