Application Security News and Articles


Launching a critical infrastructure security program in 4 phases

As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and ...

Resilience over reliance: Preparing for IT failures in an unpredictable digital world

No IT system — no matter how advanced – is completely immune to failure. The promise of a digital ring of steel may sound attractive, but can it protect you against hardware malfunctions? Software bugs? Unexpected environmental conditions? ...

Strengthening Kubernetes security posture with these essential steps

In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development through deployment. He focuses on best practices, automation, and continuous ...

Cybersecurity jobs available right now: October 16, 2024

Application Security Engineer Cognism | France | Hybrid – View job details As an Application Security Engineer, you will conduct in-depth security assessments of web applications, identifying vulnerabilities using automated tools ...

Unlocking the value of AI-powered identity security

While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​, according to SailPoint. Identity security adoption ...

Threat Hunting in macOS with the SecOps Cloud Platform

The second most popular OS in today’s business environment, macOS, is often neglected in cybersecurity discussions. This is likely due to Windows OS holding a dominant share (72.1%) of the global workstation market and Linux (4.03%) running ...

Nation-State Cyber Threats: The Hidden War on Infrastructure

The post Nation-State Cyber Threats: The Hidden War on Infrastructure appeared first on Votiro. The post Nation-State Cyber Threats: The Hidden War on Infrastructure appeared first on Security Boulevard.

Oracle October 2024 Critical Patch Update Addresses 198 CVEs

Oracle addresses 198 CVEs in its fourth quarterly update of 2024 with 334 patches, including 35 critical updates. Background On October 15, Oracle released its Critical Patch Update (CPU) for October 2024, the fourth and final quarterly update of ...

Simplifying NIS2 Compliance with Eclypsium

NIS2 is an EU cybersecurity directive that covers an incredibly broad set of services including but not limited to Energy, Transportation, Finance, Healthcare, and Digital Infrastructure. The legislation is designed to ensure that these critical ...

The Impact of Online Brand Impersonation on the Hiring Process

Online brand impersonation undermines a company’s reputation in the market. Studies show that as customers are targeted by phishing and brand impersonation attacks, they are more likely to blame the brand for failing to protect their data than ...

Identifying SQL Injections in a GraphQL API

Overview Many vulnerabilities in modern web applications occur due to the improper handling of user-supplied input. Command injection, cross-site scripting, XML External Entity (XXE) injections, and SQL injections all emerge from the downstream ...

USENIX NSDI ’24 – Sprinter: Speeding Up High-Fidelity Crawling of the Modern Web

Authors/Presenters:Ayush Goel and Jingyuan Zhu, University of Michigan; Ravi Netravali, Harsha V. Madhyastha Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems ...

How CyberWinter Studios Empowers Warfighters with Automation

The post How CyberWinter Studios Empowers Warfighters with Automation appeared first on AI-enhanced Security Automation. The post How CyberWinter Studios Empowers Warfighters with Automation appeared first on Security Boulevard.

Why Continuous API Security is Essential for Modern Businesses

Why Continuous API Security is Essential for Modern Businesses Why Continuous API Security is Essential for Modern Businesses In today’s interconnected world, APIs (Application Programming Interfaces) have become the cornerstone of modern ...

The Value of Breadth and Depth in SaaS Security

In July, an Emerging Tech report by analyst firm Gartner® focused on the ways SaaS ecosystem security products are transforming SaaS security. Among its recommendations, it wrote that product leaders must “focus on integration breadth and ...

Randall Munroe’s XKCD ‘Ravioli-Shaped Objects’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Ravioli-Shaped Objects’ appeared first on Security Boulevard.

Emulating the Opportunistic and Lightweight Lumma Stealer

AttackIQ has released a new assessment template that addresses the numerous post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the subscription-based information stealer known as Lumma Stealer. The post Emulating the ...

Vital Signs of Software Dependencies: Understanding Package Health

Learn how package health data empowers developers to update safely and efficiently. The post Vital Signs of Software Dependencies: Understanding Package Health appeared first on Security Boulevard.

Closing Security Gaps with AppOmni and Okta’s Integrated SaaS and Identity Protection

Read how AppOmni and Okta address the challenge of security teams correlating identity behavior with SaaS activity through the Shared Signals Framework (SSF). The post Closing Security Gaps with AppOmni and Okta’s Integrated SaaS and Identity ...

Enhance Your Insider Risk Program with These 6 Systems Integrations

Learn how the right integrations close critical data gaps, helping you gain a more complete view of your organization’s insider risk Cyber Threat Intelligence Systems Human Resources Information Systems Data Loss Prevention Solutions Inventory ...