Application Security News and Articles


Hackers are finding new ways to leverage AI

AI adoption and integration has continued its rapid momentum within the hacking community, according to Bugcrowd. Nevertheless, it continues to pose both benefits and unfortunate cyber risks. This year’s report revealed a significant shift ...

Whitepaper: Securing GenAI

The ultimate guide to AI security: key AI security risks, vulnerabilities and strategies for protection. 61% of companies use AI, but few secure it. This whitepaper covers the key AI risks being overlooked from LLMs to RAG. Inside the Securing ...

ISO 27001 Certification: A Detailed Guide on How to Get Certified

Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard: Practical Guidance for Achieving ISO 27001 Certification. ISO/IEC 27001 is an information security standard designed and regulated by the ...

Inside the Dark Web: How Threat Actors Are Selling Access to Corporate Networks

In recent weeks, underground forums on the dark web have continued to flourish as bustling marketplaces where cybercriminals sell unauthorized access to corporate networks. From VPN credentials to Remote Desktop Protocol (RDP) access, threat ...

Are Leaders Ready to Break the Ransomware Cycle

  It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries.    A top US national cybersecurity advisor stated in a recent op-ed, “This is a troubling ...

USENIX NSDI ’24 – DISTMM: Accelerating Distributed Multimodal Model Training

Authors/Presenters:Jun Huang, Zhen Zhang, Shuai Zheng, Feng Qin, Yida Wang Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) ...

Types of Security Audits: Overview and Best Practices

Cybersecurity audits are key to maintaining compliance with regulations and upholding a strong security posture. They evaluate your organization’s systems, identify vulnerabilities, and offer the insights you need to optimize security. But ...

FedRAMP Certification and Compliance: What It Is and Why It Matters

Cloud technologies increase access to information, streamline communication between government agencies and citizens, and accelerate information sharing. And that’s why the U.S. government has become a champion of cloud computing. But each perk ...

Survey Surfaces Depth and Scope of Identity Management Challenge

A survey of 510 IT security and risk practitioners finds 93% have access to a comprehensive inventory of human and non-human identities across their IT environments, with 85% having a clear line of visibility and monitoring into who is doing ...

USENIX NSDI ’24 – Accelerating Neural Recommendation Training with Embedding Scheduling

Authors/Presenters:Chaoliang Zeng, Xudong Liao, Xiaodian Cheng, Han Tian, Xinchen Wan, Hao Wang, Kai Chen Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design ...

DEF CON 32 – AppSec Village – Web2 Meets Web3 Hacking Decentralized Applications

Authors/Presenters: Peiyu Wang Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their timely []DEF CON 32]2 erudite content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Hurricane scammers: How to stay safe during national emergencies

During national weather emergencies, many turn to online platforms to get the latest news but don’t know about the threat lurking in the weeds: Hurricane scammers. The post Hurricane scammers: How to stay safe during national emergencies ...

Is It Time to Move on from Your Legacy GRC Solution?

Is your organization stuck with a legacy GRC solution that feels more like a blocker than an innovator? You’re not alone. Many companies today find themselves with outdated GRC systems that were once cutting-edge but now fall short of ...

USENIX NSDI ’24 – Parcae: Proactive, Liveput-Optimized DNN Training on Preemptible Instances

Authors/Presenters:Jiangfei Duan, The Chinese University of Hong Kong; Ziang Song, ByteDance; Xupeng Miao and Xiaoli Xi, Carnegie Mellon University; Dahua Lin, The Chinese University of Hong Kong; Harry Xu, University of California, Los Angeles; ...

Randall Munroe’s XKCD ‘Experimental Astrophysics’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Experimental Astrophysics’ appeared first on Security Boulevard.

Securing Financial Operations: Know Your SaaS

Regulatory concerns may have slowed initial SaaS adoption for financial services companies, but today, many rely heavily on apps like Salesforce, Microsoft 365, and ServiceNow to manage their operations.  Now, fully invested, financial services ...

Data Breach Statistics [2024] : Penalties and Fines for Major regulations

In today’s data-driven world, data breaches are one of the most significant threats facing organizations, with the financial impact varying widely across industries. The cost of a data breach is often determined by the nature of the data ...

USENIX NSDI ’24 – OPPerTune: Post-Deployment Configuration Tuning of Services Made Easy

Authors/Presenters:Gagan Somashekar, Karan Tandon, Anush Kini, Chieh-Chun Chang, Petr Husak, Ranjita Bhagwan, Mayukh Das, Anshul Gandhi, Nagarajan Natarajan Our sincere thanks to USENIX, and the Presenters & Authors for publishing their ...

Graylog enables organizations to make more informed decisions about their security posture

Graylog unveiled significant security advancements to drive smarter, faster, and more cost-efficient security operations. The company’s latest capabilities include advanced data routing, asset-based risk scoring, and AI-generated investigation ...

Testing Security Controls in the Indo-Pacific: A Critical DoD Imperative

The Indo-Pacific region has emerged as a focal point of geopolitical tension and technological competition. The post Testing Security Controls in the Indo-Pacific: A Critical DoD Imperative appeared first on AttackIQ. The post Testing Security ...