Application Security News and Articles


NIST’s NICE: 3 ways to adapt the hiring framework for modern threats

The National Initiative for Cybersecurity Education's cybersecurity hiring framework may be a good place to start when putting together a solid security team. However, some changes are needed for NICE to equip teams with the knowledge, skills — ...

Securing APIs in Retail: Safeguarding Customer Data

The retail industry’s digital transformation has made secure APIs essential to modern operations since they are at the core of this shift. APIs power everything from e-commerce platforms and mobile shopping apps to inventory management, ...

Cynet enables 426% ROI in Forrester Total Economic Impact Study

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf of Cynet in October 2024. The Total Economic Impact Study ...

PowerDMARC Integrates with ConnectWise

PowerDMARC proudly announces its integration with ConnectWise. Check out the ConnectWise integration benefits for enhanced cybersecurity. The post PowerDMARC Integrates with ConnectWise appeared first on Security Boulevard.

North Korean hackers pave the way for Play ransomware

North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: ...

Lottie Player compromised in supply chain attack — all you need to know

Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a few hours. Understand what this threat means for your ...

Claro Enterprise Solutions helps organizations identify vulnerabilities within Microsoft 365

Claro Enterprise Solutions launched Collaboration Security Management solution. This comprehensive service addresses critical security challenges related to file sharing, data loss events, or unknown shadow users, faced by organizations using ...

Constella Intelligence Launches HunterTM Copilot AI Assistant for Dark Web Investigations

Automate criminal identity investigations and unmask threat actors with AI-powered link discovery for faster, deeper insights. Constella Intelligence today announced the launch of Hunter Copilot, a transformative new AI assistant feature within ...

IoT needs more respect for its consumers, creations, and itself

Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot vacuums from Chinese company, Ecovacs, can be compromised via a backdoor. In one case, hackers gained control over the ...

How agentic AI handles the speed and volume of modern threats

In this Help Net Security interview, Lior Div, CEO at Seven AI, discusses the concept of agentic AI and its application in cybersecurity. He explains how it differs from traditional automated security systems by offering greater autonomy and ...

Why cyber tools fail SOC teams

A recent Vectra AI report highlights a growing distrust of threat detection tools. 47% of respondents note they do not trust their tools to work the way they need them to. Moreover, 60% of SOC practitioners say security vendors flood them with ...

99% of CISOs work extra hours every week

The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, according to DirectDefense. Cybersecurity industry faces ongoing talent ...

A Wave of Identity Security Reports Defines a Big Problem

There have been a wealth of reports lately articulating the poor state of identity risk.... The post A Wave of Identity Security Reports Defines a Big Problem appeared first on Axiad. The post A Wave of Identity Security Reports Defines a Big ...

The evolution of open source risk: Persistent challenges in software security

As organizations increasingly rely on open source software, associated security risks grow, demanding more robust and proactive risk management. The post The evolution of open source risk: Persistent challenges in software security appeared first ...

Cloud Security Alliance Advocates Zero Trust for Critical Infrastructure

The Cloud Security Alliance, noting the increasing cyberthreats to critical infrastructure in a highly interconnected world, released a report outlining steps organizations can take to implement zero trust policies to protect against nation-state ...

DEF CON 32 – AppSec Village – Maturing Your Application Security Program – SheHacksPurple

Authors/Presenters:Tanya Janca Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely []DEF CON 32]2 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Citrix Boosts Security for Remote Application Accesses With “More Security Layers”

Connections on the internet are not secure by default, and bad actors frequently take advantage of users accessing organizations’ applications and resources from remote locations, to burrow into corporate networks. Experts recommend picking a ...

AI in Banking: No Longer Just for the Big Banks

Tigran Safari, Client Success Manager AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements on this month’s Banking Podcast from The ...

Survey Surfaces Fundamental Weaknesses in API Security

Traceable AI today published a global survey of 1,548 IT and cybersecurity professionals that finds well over half (57%) work for organizations that have experienced a data breach incident involving application programming interfaces (APIs) in ...

News alert: Cybersecurity, AI priorities for 2025 highlighted at ATPC Cyber Forum in Atlanta

Atlanta, GA, Oct. 30, 2024, CyberNewswire — The American Transaction Processors Coalition (ATPC) Cyber Council will convene “The Tie that Binds: A 21st Century Cybersecurity Dialogue,” on October 31, 2024, at the Bank of America Financial ...