Application Security News and Articles


MongoDB Queryable Encryption now supports range queries on encrypted data

MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the MongoDB database. It also enables direct equality and range queries on the encrypted data without the need ...

Solid Data Security: The Foundation of a Safe Digital World

Solid Data Security: The Foundation of a Safe Digital World madhav Thu, 10/17/2024 - 04:58 It’s that time of year again. The nights are drawing in, the leaves are yellowing on the trees, and the summer is already becoming a mere memory. Oh, ...

GhostStrike: Open-source tool for ethical hacking

GhostStrike is an open-source, advanced cybersecurity tool tailored for ethical hacking and Red Team operations. It incorporates cutting-edge techniques, including process hollowing, to stealthily evade detection on Windows systems, making it an ...

How NIS2 will impact sectors from healthcare to energy

In this Help Net Security interview, Mick Baccio, Global Security Advisor at Splunk SURGe, discusses the far-reaching implications of the NIS2 Directive beyond traditional IT security. He explains how NIS2 will fundamentally change cybersecurity ...

Gartner® Magic Quadrant™ for Endpoint Protection Platforms

While programs like CTEM may be upcoming, Gartner® Hype Cycle for Security Operations recommends making incremental shifts early on. The post Gartner® Magic Quadrant™ for Endpoint Protection Platforms appeared first on SafeBreach. The post ...

AI data collection under fire

A recent Cohesity report found that consumers are highly concerned about the information companies collect from them – especially when it`s used for artificial intelligence – with consumers prepared to punish companies by switching ...

Why companies are struggling to keep up with SaaS data protection

While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents ...

USENIX NSDI ’24 – Finding Adversarial Inputs for Heuristics using Multi-level Optimization

Authors/Presenters:Pooria Namyar, Microsoft and University of Southern California; Behnaz Arzani and Ryan Beckett, Microsoft; Santiago Segarra, Microsoft and Rice University; Himanshu Raj and Umesh Krishnaswamy, Microsoft; Ramesh Govindan, ...

A Turning Point in Loyalty Fraud Prevention

See how a recent FTC settlement highlights the need for effective loyalty fraud prevention strategies to mitigate risk, secure customer data, and minimize financial loss. The post A Turning Point in Loyalty Fraud Prevention appeared first on ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #309 – Prioritising with Management

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Apple Enrages IT — 45-Day Cert Expiration Fury

CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators. The post Apple Enrages IT — 45-Day Cert Expiration Fury appeared first on Security Boulevard.

Fortinet Integrates Lacework CNAPP into Cybersecurity Portfolio

Fortinet has made generally available a version of the CNAPP it gained that is now integrated with the Fortinet Security Fabric, an orchestration framework the company developed to centralize the management of its cybersecurity portfolio. The ...

Escalation of Cyber Warfare in the Israel-Palestine Conflict: A Deep Dive into Recent Israeli Breaches

The geopolitical conflict between Israel and its adversaries has shifted into the digital sphere, where sophisticated cyberattacks have become a primary tool for targeting critical sectors. In recent months, cyberattacks have exposed Israeli ...

USENIX NSDI ’24 – Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming

Authors/Presenters:Zili Meng, Xiao Kong, Jing Chen, Bo Wang. Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu, Xue Wei Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on ...

More Ransoms Being Paid and More Data Being Lost: Hornetsecurity

A survey of IT professionals by Hornetsecurity found that while the number of ransomware victims are paying the ransoms, more of the data is being lost. In addition, while ransomware protection is a top priority, many feared their organizations ...

ExtraHop RevealX enhancements accelerate investigation workflows

ExtraHop unveiled new network-based file analysis capabilities in ExtraHop RevealX to detect malware, combat ransomware, and help prevent data loss. According to the 2024 Global Ransomware Trends Report, organizations experience an average of ...

Okta helps protect business before, during and after authentication

Okta announced new Workforce Identity Cloud capabilities to address top security challenges such as unmanaged SaaS service accounts, governance risks, and identity verification. As part of a unified approach, these innovations help protect ...

At Nearly $1 Billion Global Impact, the Best Cloud Security Couldn’t Stop This Hybrid Attack Path. Lesson: Map and Close Viable Attack Paths Before Breaches Begin.

Conventional wisdom suggests best-of-breed is the only way to secure your clouds. But what of hybrid attack paths that cross security domains — like those exploited in the SolarWinds and Capital One breaches? Exposing the gaps attackers exploit ...

Connect Everything, Fix Anything: 50+ Integrations with Veriti 

Managing multiple tools and platforms can create blind spots that leave your organization vulnerable to threats. But with Veriti’s 50+ integrations, you can eliminate these gaps and achieve total security control. By seamlessly connecting every ...

Everything you need to know about NIST Security Compliance

What Is NIST? What Is NIST Compliance? Importance of Being NIST Compliant The Benefits of Meeting NIST Cybersecurity Standards Five Main NIST Frameworks Achieve Continuous NIST Compliance with FireMon Frequently Asked Questions Get a ...