Application Security News and Articles


DEF CON 32 – AppSec Village – Securing Frontends at Scale;Paving our Way to Post XSS World

Authors/Presenters:Jen Ozmen, Aaron Shim Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely DEF CON 32 erudite content. Originating from the conference’s events located at the Las Vegas Convention ...

Embracing Innovation: Seceon’s Journey at GITEX 2024

As businesses navigate an increasingly digital landscape, leveraging advanced technologies has become essential. At GITEX 2024, Seceon proudly showcased its commitment to empowering organizations with AI-driven cybersecurity solutions, with our ...

How Data Security Can Drive an AI Revolution in Retail

Artificial intelligence (AI) is transforming the fortunes of companies across the planet. But retailers are in a particularly advantageous position, given the large volume of data they manage—on everything from stock levels to customer ...

The Entrust Distrust Deadline is Closing In. Are you Prepared?

We’re just weeks away from November 12, 2024—the date when Google Chrome will begin distrusting newly issued certificates from Entrust Roots. Shortly after, Mozilla will implement its distrust in Entrust Roots by the end of November. If your ...

The Rise of Cyberattacks on Critical Infrastructure: Are You Prepared?

Our daily lives depend on critical infrastructure – water treatment facilities, power grids, transportation systems. Unfortunately, these systems are increasingly becoming targets for cyberattacks. The post The Rise of Cyberattacks on Critical ...

DMARC MSP Case Study: CloudTech24 Simplies Domain Security Management for Clients with PowerDMARC

Reading Time: 2 min Read the inspiring story of how UK-based MSP CloudTech24 automated and simplified domain security management for multiple client domains with PowerDMARC. The post DMARC MSP Case Study: CloudTech24 Simplies Domain Security ...

Fake IT Workers: How HYPR Stopped a Fraudulent Hire

Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US or other non-North Korean based IT workers and infiltrating companies. In July, security firm KnowBe4 publicly revealed that they unknowingly ...

Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset

A recent alert jointly issued by a myriad of governmental agencies including CISA, FBI, EPA, DOE, NSA and NCSC-UK has spotlighted activities by Russians targeting U.S. and European critical infrastructure. The post Strengthening Critical ...

SEC Fines Four Tech Firms for Downplaying SolarWinds Impacts

The SEC fined Unisys, Avaya, Check Point, and Mimecast millions of dollars for disclosures in the wake of the high-profile SolarWinds data breach that intentionally mislead investors and downplayed the impact the supply chain attack had on ...

Technology for classrooms: Top 15 tools for K-12 schools 

The overwhelming majority of teachers, parents, and students believe in the efficacy of classroom technology.  The education technology sector, or EdTech, is currently valued at $142.37 billion. Its buy-in from these groups, plus that of ...

Exploring the Transformative Potential of AI in Cybersecurity 

By continuously learning from new data, ML models can adapt to evolving threat landscapes, making them invaluable in identifying zero-day vulnerabilities before they can be exploited.  The post Exploring the Transformative Potential of AI in ...

The Complete List of the Best Internal Audit Management Software

What is an Internal Audit? An internal audit is an independent, objective evaluation of your organization’s performance. It ensures that your processes and controls are functioning as they should and helps identify areas for improvement. ...

Majority of SaaS Applications, AI Tools Unmanaged

Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security. The post Majority of SaaS Applications, AI Tools ...

Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)

Fortinet has finally made public information about CVE-2024-47575, a critical FortiManager vulnerability that attackers have exploited as a zero-day. About CVE-2024-47575 CVE-2024-47575 is a vulnerability stemming from missing authentication for ...

Nucleus Security unveils POAM Process Automation for federal agencies

Nucleus Security announced Nucleus POAM Process Automation, a comprehensive solution for federal agencies and their vendors to streamline risk management and automate their Plan of Action and Milestones (POA&M) process. This solution ...

Blending Traditional and Emerging Cybersecurity Practices for a Holistic Approach

Security leaders must leverage the best of both to truly protect an organization in today's complex digital environment — blending the old with the new. The post Blending Traditional and Emerging Cybersecurity Practices for a Holistic Approach ...

F5 BIG-IP Next for Kubernetes reduces the complexity of AI deployments

F5 announced BIG-IP Next for Kubernetes, an AI application delivery and security solution that equips service providers and large enterprises with a centralized control point to accelerate, secure, and streamline data traffic that flows into and ...

What’s more important when hiring for cybersecurity roles?

When building a cybersecurity team, you likely asked yourself, “Should I focus on certifications or real-world skills?” And since you rarely encounter entry-level candidates who can hit the ground running, naturally, you’d consider a ...

Enhancing national security: The four pillars of the National Framework for Action

In this Help Net Security interview, John Cohen, Executive Director, Program for Countering Hybrid Threats at the Center for Internet Security, discusses the four pillars of the National Framework for Action, emphasizing how these measures can ...

Facing the uncertainty of cyber insurance claims

Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty around coverage in the event of an incident. As cyberattacks continue ...