Application Security News and Articles


D3 Security Releases “In the Wild 2024” Report with Analysis and Incident Response Playbooks for the 10 Most Prevalent Cyber Attack Techniques

Vancouver, BC — April 10, 2024 — D3 Security, the leader in smart security orchestration, automation, and response (SOAR), today published In the Wild 2024, the first in a series of reports that analyzes real-world cybersecurity data and ...

Why are many businesses turning to third-party security partners?

In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been forced to scale back their cybersecurity programs as they struggle to ...

WEF Cybercrime Atlas: Researchers are creating new insights to fight cybercrime

In early 2023, the World Economic Forum (WEF) launched Cybercrime Atlas, with the intent to map the cybercriminal ecosystem by facilitating collaboration between private and public organizations. What does this collaboration look like in ...

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research ...

Cybersecurity jobs available right now: April 10, 2024

Application Security Engineer HCLTech | Mexico | Remote – View job details As an Application Security Engineer, you will work on the security engineering team and collaborate with other IT professionals to ensure that user data is ...

GSMA releases Mobile Threat Intelligence Framework

GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries attack and use mobile networks, based on the tactics, techniques and procedures (TTPs) that ...

Complete Guide to ISA/IEC 62443-3-2: Risk Assessments for Industrial Automation and Control Systems

ISA/IEC 62443-3-2 is a globally recognized standard designed specifically to address the unique cybersecurity challenges faced by industrial control systems and critical infrastructure. Throughout this guide, we dive deep into the complexities of ...

Navigating Third-Party Cyber Risks in Healthcare: Insights from Recent Events

Looking at billing services’ impact on healthcare organizations Last week’s blog talked about the events that nearly brought Change Healthcare’s services to a halt. This week, we’re going to look Read More The post Navigating Third-Party ...

Patch Tuesday Update – April 2024

The post Patch Tuesday Update - April 2024 appeared first on Digital Defense. The post Patch Tuesday Update – April 2024 appeared first on Security Boulevard.

FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars

In January, the Federal Communications Commission (FCC) sent letters to automakers and wireless service providers to hear what they were doing to protect survivors of domestic violence from being stalked by their abusers through real-time ...

Microsoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend ...

USENIX Security ’23 – Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang,- xorcising “Wraith”: Protecting LiDAR-based Object Detector In Automated Driving System From Appearing Attacks

Permalink The post USENIX Security ’23 – Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang,- xorcising “Wraith”: Protecting LiDAR-based Object Detector In Automated Driving System From Appearing Attacks ...

LG smart TVs may be taken over by remote attackers

Bitdefender researchers have uncovered four vulnerabilities in webOS, the operating system running on LG smart TVs, which may offer attackers unrestricted (root) access to the devices. “Although the vulnerable service is intended for LAN ...

Should You Pay a Ransomware Attacker?

For many businesses, it’s a worst-case scenario.  You open your laptop and try to access... The post Should You Pay a Ransomware Attacker? appeared first on Security Boulevard.

Daniel Stori’s ‘Minimum Viable Elevator’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘Minimum Viable Elevator’ appeared first on Security Boulevard.

MDR for Better Office 365 Security

Microsoft Office 365 is a stalwart suite of apps that powers collaboration, communication and productivity for companies of all sizes. Companies gravitate toward tools like Exchange Online for email communications, SharePoint for document ...

Breaking APIs with Naughty Strings

Learn how to leverage the Big List of Naughty Strings (BLNS) to break APIs using nothing more than Postman. The post Breaking APIs with Naughty Strings appeared first on Dana Epp's Blog. The post Breaking APIs with Naughty Strings appeared first ...

Patch Tuesday Update – April 2024

For April 2024, Microsoft has rolled out a significant update aimed at bolstering the security and performance of its product suite. In this month’s release, users and IT administrators are encouraged to prioritize these updates to protect ...

Hyperproof Is a G2 Category Leader (Again) for Spring 2024

Hyperproof is starting off this spring strong with an incredible 31 G2 awards! This wouldn’t be possible without our amazing customers. Thank you all for submitting your experiences with Hyperproof and taking the time to share what you think ...

USENIX Security ’23 – Jisoo Jang, Minsuk Kang, Dokyung Song – ReUSB: Replay-Guided USB Driver Fuzzing

Permalink The post USENIX Security ’23 – Jisoo Jang, Minsuk Kang, Dokyung Song – ReUSB: Replay-Guided USB Driver Fuzzing appeared first on Security Boulevard.