Application Security News and Articles


Corero CORE turns isolated security events into actionable intelligence

Corero Network Security launched a new cloud-based availability protection platform, CORE. CORE by Corero Network Security is a cloud-based availability protection platform designed to seamlessly enhance a company’s existing security ...

Spooky Spam, Scary Scams: Halloween Threats Rise

Halloween-themed spam has risen sharply this season, with Bitdefender reporting that 40% of these emails contain malicious content designed to scam users or harvest personal data. In the first half of October alone, spam volumes increased by 18% ...

Patching problems: The “return” of a Windows Themes spoofing vulnerability

Despite two patching attempts, a security issue that may allow attackers to compromise Windows user’s NTLM (authentication) credentials via a malicious Windows themes file still affects Microsoft’s operating system, 0patch researchers ...

Seceon’s Comprehensive Cybersecurity Platform: Revolutionizing Threat Detection and Response

In our fast-changing digital landscape, cybersecurity is more important than ever. With cyber threats becoming more sophisticated and targeting businesses from all angles, it’s clear that companies need a smart, integrated solution to detect, ...

October Cybersecurity Awareness Month: Ensuring Data Security and Compliance is an Ongoing Concern

Data should stay within a company’s control, whether it’s in a cloud account or data center, to meet security, residency and sovereignty needs. The post October Cybersecurity Awareness Month: Ensuring Data Security and Compliance is an ...

PIXM protects MSPs from credential theft and phishing attacks

PIXM Security launched its new Managed Service Provider (MSP) program for zero-day phishing protection. With over 500,000 end users already protected, PIXM shields MSPs and their customers from credential theft and zero-day phishing attacks that ...

Guest Essay: API security-related exposures rose steeply across all industries in Q3 2024

Application Programming Interfaces (APIs) have become the backbone of modern enterprises, facilitating seamless communication between both internal systems and external partners. Related: Biden-Harris administration opens Supply Chain Resilience ...

Inside console security: How innovations shape future hardware protection

In this Help Net Security interview, security researchers Specter and ChendoChap discuss gaming consoles’ unique security model, highlighting how it differs from other consumer devices. They also share their thoughts on how advancements in ...

OT PCAP Analyzer: Free PCAP analysis tool

EmberOT’s OT PCAP Analyzer, developed for the industrial security community, is a free tool providing a high-level overview of the devices and protocols in packet capture files. “The OT PCAP Analyzer was designed specifically with ...

49% of Enterprises Fail to Identify SaaS Vulnerabilities

The rising occurrence of SaaS data breaches has emerged as a major concern for businesses globally. A report from AppOmni reveals that 31% of organizations experienced a SaaS data breach in 2024, marking a notable increase from the previous year. ...

Cybersecurity jobs available right now: October 29, 2024

API Gateway Security Engineer Ness Technologies | Israel | Hybrid – View job details As an API Gateway Security Engineer, you will be responsible for managing and implementing API Gateway solutions with a strong focus on ...

More Than Just a Corporate Wiki? How Threat Actors are Exploiting Confluence

Recently, the Cofense Phishing Defense Center (PDC) has seen an increase in malicious emails utilizing legitimate third-party business software to evade detection while maintaining a high level of deception. In this instance, the collaboration ...

The state of password security in 2024

In this Help Net Security video, John Bennett, CEO at Dashlane, discusses their recent Global Password Health Score Report, detailing the global state of password health and hygiene. Poor security habits like password reuse remain widespread. ...

Trust and risk in the AI era

55% of organizations say the security risks for their business have never been higher, according to Vanta. Yet the average company only dedicates 11% of its IT budget to security — far from the ideal allocation of 17%, according to business and ...

The SaaS Governance Gap | Grip Security

Get data on the SaaS governance gap and learn why managing shadow SaaS and ensuring secure, compliant usage is critical in today’s cloud-driven landscape. The post The SaaS Governance Gap | Grip Security appeared first on Security Boulevard.

Outdated SOAR Is Putting Your Organization at Risk

Is your legacy SOAR putting you at risk? Uncover the hidden dangers of outdated SOAR tools and how they could be jeopardizing your security. The post Outdated SOAR Is Putting Your Organization at Risk appeared first on D3 Security. The post ...

News alert: INE shares guidance to help companies invest in year-end cybersecurity, networking training

Cary, NC, Oct. 28, 2024, CyberNewswire — As the year-end approaches, it’s common for enterprises to discover they still have funds that must be utilized. Often, these L&D dollars are “use or lose,” meaning they will be returned to the ...

INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs

Cary, NC, 28th October 2024, CyberNewsWire The post INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs appeared first on Security Boulevard.

Protecting Public Sector Organizations from the Threat of Compromised Credentials

Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations. The post Protecting Public Sector Organizations from the Threat of Compromised Credentials appeared first on Security Boulevard.

DEF CON 32 – AppSec Village – BOLABuster-Harnessing LLMs for Automating BOLA Detection

Authors/Presenters:Ravid Mazon, Jay Chen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention ...