Application Security News and Articles


CISOs Concerned Over Growing Demands of Role

There are growing concerns among chief information security officers (CISOs) about the evolving demands of their role, with 84% advocating for a split into separate technical and business-focused positions. The Trellix and Vanson Bourne survey of ...

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for ...

Israeli orgs targeted with wiper malware via ESET-branded emails

Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email. The phishing email The attack took the form of a phishing email ostensibly sent by the “Eset ...

Understanding the Importance of MFA: A Comprehensive Guide

Protecting digital identities is essential for individuals and organizations in a world where cyberattacks are becoming more sophisticated and frequent. If anything has proven to boost security massively, it has to be the proper utilization of ...

Arrested: USDoD, Anonymous Sudan, SEC X account hacker

Law enforcement agencies have arrested suspects involved in cyber attacks claimed by USDoD and Anonymous Sudan, as well as a person involved in the hacking of SEC’s X (Twitter) account. USDoD On Wednesday, the Brazilian federal police ...

How to Master CentOS Commands: The Ultimate Cheat Sheet

Mastering CentOS commands can help you effectively manage CentOS systems, perform common tasks, and troubleshoot issues. Process management is streamlined using commands like ps and top, which help monitor and troubleshoot system performance in ...

CyCognito expands automated testing capabilities

CyCognito announced several enhancements to its CyCognito Automated Security Testing (AST) product, a module in the CyCognito platform built for automated exposure validation and security testing. These additions speed the configuration of ...

US Crackdown With Microsoft: Over 100 Russian Domains Seized

In the most recent US crackdown with Microsoft a total of 107 Russian domains have been seized. Reports claim that these domains were mainly used by state sponsored threat actors for malicious purposes. In this article, we’ll dive into the ...

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing security tools, according to Gigamon. Blind spots ...

What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their phones, a fact that criminals are well aware of. Cybersecurity risks ...

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in ...

New infosec products of the week: October 18, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik, and Sectigo. GitGuardian Visual Studio Code extension helps developers protect their sensitive information ...

The Evolution of Automated Browser Detection: A Cat & Mouse Game

Automated browser detection has changed dramatically throughout the years as bot developers seek easier ways to bypass detection, and bot protection vendors find new ways to identify and stop bots. The post The Evolution of Automated Browser ...

CVE-2024-9381 – Ivanti CSA Security Vulnerability – October 2024

A critical vulnerability (CVE-2024-9381) in Ivanti’s Cloud Services Appliance allows attackers to bypass security measures and execute arbitrary code.  Affected Platform  CVE-2024-9381 impacts Ivanti’s Cloud Services Appliance (CSA), a ...

Life in the Swimlane with Abby Shapiro, Customer Success Manager  

The post Life in the Swimlane with Abby Shapiro, Customer Success Manager   appeared first on AI-enhanced Security Automation. The post Life in the Swimlane with Abby Shapiro, Customer Success Manager   appeared first on Security Boulevard.

45-Day Certs? You’ve Got No Time to Lose!

Remember when we were bracing ourselves for 90-day certificates?  That shift felt like a game-changer, yet here we are, with a new curveball: 45-day certificates are making their way into the mix. It wasn’t too long ago that speculation around ...

Mastering Product-led Onboarding in B2B SaaS: A Comprehensive Guide

Dive into the world of product-led onboarding for B2B SaaS. This guide explores key strategies and best practices to create an engaging and effective onboarding experience that turns new users into power users. Learn how to optimize user ...

SafeBreach Coverage for US CERT AA24-290A (Iranian Cyber Actors)

Iranian threat actors are using brute force and other techniques to compromise critical infrastructure entities. The post SafeBreach Coverage for US CERT AA24-290A (Iranian Cyber Actors) appeared first on SafeBreach. The post SafeBreach Coverage ...

ADR Provides Application Visibility for CISOs | Closing Application Layer Gap | Contrast Security

Good cyber defense involves more than blocking and tackling. Without visibility into what’s happening, where and by whom, enterprises are hard-pressed to maintain solid protection of systems, networks and data. One area where visibility falls ...

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security

The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies like AI, quantum computing, and the ...