Application Security News and Articles


Lessons from the Cisco Data Breach—The Importance of Comprehensive API Security

In the wake of Cisco’s recent data breach involving exposed API tokens - amongst other sensitive information -  the cybersecurity community is reminded once again of the significant risks associated with unsecured APIs. Though Cisco has ...

US charges suspected Redline infostealer developer, admin

The identity of a suspected developer and administrator of the Redline malware-as-a-service operation has been revealed: Russian national Maxim Rudometov. Infrastructure takedown As promised on Monday when they announced the disruption of the ...

What is Datagram Transport Layer Security (DTLS): Benefits & Challenges

DTLS stands for datagram transport layer security. Check out the explanation of each term, and learn about the specific benefits and usage in cybersecurity. The post What is Datagram Transport Layer Security (DTLS): Benefits & Challenges ...

TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan

Dimon’s dollars (not yours): No, Chase Bank isn’t going to let you cash bad checks. It’s fraud—no matter what X and TikTok tell you. The post TikTok ‘Infinite Money Glitch’ — Idiots Chased by JPMorgan appeared first on Security ...

KEV + CWE = Attack Vector ❤️‍

Learn how to cross-reference Known Exploit Vulnerabilities (KEV) against CWE to find the best attack vectors to use during security testing. The post KEV + CWE = Attack Vector ❤️‍

DEF CON 32 – AppSec Village – The Missing Link – How We Collect And Leverage SBOMs

Authors/Presenters:Cassie Crossley Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

DigiCert – It’s a Matter of Trust

Starlink encountered a high-profile outage in April that caused service to go down for several hours. The reason was an expired digital certificate. Digital certificates have emerged as the currency of digital trust in the hyper-connected world ...

How to Achieve a Secure and Resilient IT Infrastructure in 6 Steps

Securing IT infrastructure is a continual journey for every security team. A resilient infrastructure enables organizations to not only defend against modern cyber threats but also to quickly recover from attacks or system failures. Building and ...

The Cloud Latency Map measures latency across 100+ cloud regions

Kentik launched The Cloud Latency Map, a free public tool allowing anyone to explore the latencies measured between over 100 cloud regions worldwide. Users can identify recent changes in latencies globally between various public clouds and data ...

We are joining forces with Google Cloud to accelerate AI and software development with privacy-first data solutions on Google Cloud Marketplace

Tonic.ai is now on Google Cloud Marketplace enabling developers to safely leverage their enterprise data. Learn more today. The post We are joining forces with Google Cloud to accelerate AI and software development with privacy-first data ...

Achieving Excellence through ISMS Implementation

An Information Security Management System (ISMS) is key to safeguarding your business and protecting sensitive data. The post Achieving Excellence through ISMS Implementation appeared first on Scytale. The post Achieving Excellence through ISMS ...

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

Announcing an exclusive partnership between Mend.io and HeroDevs to provide support for deprecated packages. The post Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package appeared first on Security Boulevard.

Securiti Gencore AI accelerates GenAI adoption in the enterprise

Securiti released Gencore AI, a holistic solution to easily build safe, enterprise-grade GenAI systems, copilots and AI agents. This new solution accelerates GenAI adoption in the enterprise by making it easy to build unstructured and structured ...

Preparing for the future: Apple’s 45-Day certificate lifespan proposal

The digital certificate lifecycle is undergoing significant changes, with a push towards shorter validity periods for SSL/TLS certificates. Currently, the lifespan of certificates is about 398 days, but companies like Google and Apple are ...

Aviatrix unveils features to simplify network security management

Aviatrix unveiled new features and functionality designed to fill critical cloud network security gaps in cloud environments. With its latest software release and introduction of new features, including the Hybrid Cloud Transit and Distributed ...

Phishers reach targets via Eventbrite services

Crooks are leveraging the event management and ticketing website Eventbrite to deliver their phishing emails to potential targets. “Since July, these attacks have increased 25% week over week, resulting in a total growth rate of ...

Zenity raises $38 million to secure agentic AI

Zenity announced they have received $38 million in Series B funding co-led by Third Point Ventures and DTCP, pushing the total capital raised to over $55 million. It follows the recent strategic investment by Microsoft’s venture arm, M12, ...

Exprivia Partners With Seceon to Offer Seceon’s Cybersecurity Platform and Exprivia Cybersecurity Services Powered by Seceon

Leading information and communication technology provider is now offering an AI/ML-powered threat detection and response platform and services across Italy, Spain and DACH regions. Milan, Italy and Westford, MA, USA – Seceon, the pioneer of the ...

Akamai strenghtens protection against account abuse

Akamai launched new capabilities to its Account Protector security solution. These enhancements are designed to safeguard user accounts against abuse throughout their entire lifecycle and provide advanced protection against account opening abuse, ...

Connected car security: Software complexity creates bumps in the road

Modern vehicles are essentially computers on wheels, with interconnected software-enabled systems such as advanced driver assistance systems (ADAS), keyless entry, onboard diagnostics, infotainment, and battery management functions. Many of these ...