Application Security News and Articles


Cyber Scams & Why We Fall for Them

Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical thinking is often overridden. ...

AWS Seizes Domains Used by Russian Threat Group APT29

Cloud computing giant AWS, tipped off by Ukrainian security experts, seized domains that were being used by Russian threat group APT29 to send phishing emails to government officials and enterprises that contained malicious files that would ...

The Three Pillars of Shift-Left API Security

When it comes to proactive API security, there are three critical pillars: API Discovery, API Security Testing, and API Oversight. The post The Three Pillars of Shift-Left API Security appeared first on Security Boulevard.

100 MILLION Americans in UnitedHealth PII Breach

Not cute: $UNH’s Change Healthcare unit paid a big ransom—its IT was as weak as a kitten. The post 100 MILLION Americans in UnitedHealth PII Breach appeared first on Security Boulevard.

DEF CON 32 – AppSec Village – The Immortal Retrofuturism of Mainframes and How to Keep Them Safe

Authors/Presenters:Michelle Eggers Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

How to Elevate Your GSOC’s Impact in a World of Rising Threats

Keep your organization safe and drive real business impact with better situational awareness, threat monitoring, and communication As a student of protection history and former counter-terrorism special agent who investigated countless embassy ...

Cequence Security – A Leader and Outperformer in GigaOm API Security Radar Report

Cequence Security has been recognized as a Leader and Outperformer in the new GigaOm Radar for API Security report, highlighting our innovative approach and comprehensive protection capabilities. This recognition comes as a testament to our ...

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24

Insight #1:  Chuck the checkbox, seize real risk To achieve a strong security posture, CISOs must avoid a "checkbox mentality" that prioritizes compliance over actual risk management and instead cultivate a security culture that is ...

SEC fines tech companies for misleading SolarWinds disclosures

The Securities and Exchange Commission charged four current and former public companies – Unisys Corp., Avaya Holdings Corp., Check Point Software Technologies Ltd, and Mimecast Limited – with making materially misleading disclosures ...

CISOs Should Be Directing IAM Strategy — Here’s Why 

By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy. The post CISOs Should Be Directing IAM Strategy — Here’s Why  appeared ...

EDR Dependency: Ensuring Uninterrupted and Comprehensive Security Coverage

By merging EDRs with defense-in-depth technologies such as AMTD, businesses can detect and respond to known threats, as well as those lurking in the cracks. The post EDR Dependency: Ensuring Uninterrupted and Comprehensive Security Coverage ...

java security frameworks

java security frameworksContinue reading on Medium »

java secure coding

java secure codingContinue reading on Medium »

Exploited: Cisco, SharePoint, Chrome vulnerabilities

Threat actors have been leveraging zero and n-day vulnerabilities in Cisco security appliances (CVE-2024-20481), Microsoft Sharepoint (CVE-2024-38094), and Google’s Chrome browser (CVE-2024-4947). CVE-2024-20481 (Cisco ASA/FTD) In the past ...

Proof Verify reduces false positives and improves fraud detection accuracy

Proof launched Verify, a live face-to-face experience that delivers high-level assurance with identity verification performed in the presence of an agent, reducing the risk of fraudulent activities such as deepfakes by ensuring that users are ...

Cyberattacks Against Sporting Events are Growing More Calculated

The amount of data being collected and shared online before and during large sporting events is low-hanging fruit for attackers. The post Cyberattacks Against Sporting Events are Growing More Calculated appeared first on Security Boulevard.

3 Tips for Organizations to Shore Up Their Cyber Resilience Strategies This Fall

As businesses gear up for another risky fall holiday season, visibility, control and security hygiene remain paramount for success and stability. The post 3 Tips for Organizations to Shore Up Their Cyber Resilience Strategies This Fall appeared ...

AuthenticID360 blocks AI-generated IDs during digital onboarding

AuthenticID released AuthenticID360, its new holistic identity verification platform. AuthenticID360 delivers robust verification and risk signaling capabilities, including a 2-second response time for identity transactions. A unified solution ...

Concentric AI raises $45 million to expand go-to-market strategies

Concentric AI has secured financing of $45 million in a Series B round, bringing the company’s total funding to more than $67 million. The funding round was led by Top Tier Capital Partners and HarbourVest Partners. CyberFuture, a global CISO ...