Application Security News and Articles


Navigating the Cybersecurity Risks of Shadow & Open-Source GenAI

Generative AI is no doubt the leading frontier in AI. Models have captured attention and driven exciting use cases across industries with their ability to create everything from text to images, and even solve complex coding problems. The likes of ...

USENIX NSDI ’24 – LuoShen: A Hyper-Converged Programmable Gateway for Multi-Tenant Multi-Service Edge Clouds

Authors/Presenters:Tian Pan, Kun Liu, Xionglie Wei, Yisong Qiao, Jun Hu, Zhiguo Li, Jun Liang, Tiesheng Cheng, Wenqiang Su, Jie Lu, Yuke Hong, Zhengzhong Wang, Zhi Xu, Chongjing Dai, Peiqiao Wang, Xuetao Jia, Jianyuan Lu, Enge Song, Jun Zeng, ...

Cybersecurity Risk Assessment Best Practices | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cybersecurity Risk Assessment Best Practices | Kovrr appeared first on Security Boulevard.

Bitdefender Scam Copilot detects and combats online scams

Bitdefender launched Scam Copilot, an advanced technology platform powered by AI and designed to detect and fight scams along with fraud attempts across devices including computers, tablets, and mobile phones. The platform has been integrated ...

Air-Gapped Systems Breached: A Deep Dive into the Attack and Prevention

Once considered impregnable bastions of security, air-gapped systems have been shown to be vulnerable to sophisticated attacks. These systems, physically isolated from networks, were believed to be immune to remote hacking. The post Air-Gapped ...

Attackers deploying red teaming tool for EDR evasion

Threat actors are leveraging the open-source EDRSilencer tool to evade endpoint detection and response systems, Trend Micro researchers have noticed. About EDRSilencer The software, which is intended for red teaming, is being abused to ...

Secuvy unveils features designed to improve data security

Secuvy released several new features designed to enhance data security, mitigate insider threats, and streamline privacy operations. These innovations strengthen Secuvy’s capabilities in compliance, risk management, data leakage prevention, ...

Nametag Deepfake Defense blocks AI-powered impersonation threats

More than 50% of executives expect deepfake attacks to increase over the next 12 months, but only 7% report using new technologies to detect deepfakes. Meanwhile, researchers are repeatedly demonstrating how AI-generated ID documents, selfie ...

Data Zoo ID Fraud & Risk Signals enhances fraud detection

Data Zoo launched its latest service, ID Fraud & Risk Signals. This new solution is designed to enhance customer identification and Know Your Customer (KYC) processes by providing deeper insights into fraud detection and risk assessment, ...

Cequence Trust Center: Commitment to Security and Compliance for Our Customers

Why Trust Centers Matter A Trust Center plays a crucial role in building and maintaining trust with customers. It provides a single source of truth for security documentation, certifications, and ongoing updates, helping businesses reassure ...

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Uncover lessons from Agile + DevOpsDays Des Moines 2024, featuring talks on DevEx automation, incident response, and building safer, more productive development teams. The post Agile + DevOpsDays Des Moines 2024: Finding A Common Path With ...

Cato DEM helps IT teams overcome network performance problems

Cato Networks expanded the Cato SASE Cloud Platform by introducing Cato Digital Experience Monitoring (DEM). This announcement is the third major expansion to the Cato SASE Cloud Platform in 2024, following the additions of extended detection and ...

Cybersecurity Awareness Month: How CISOs can engage, educate, and empower

Author: Mike Britton, Chief Information Security Officer, Abnormal Security October is upon us, and as we embrace the start of […] The post Cybersecurity Awareness Month: How CISOs can engage, educate, and empower appeared first on Security ...

Nametag Adds Ability to Thwart Deep Fakes to Identity Verification Platform

Nametag today extended its identity verification platform to add an ability to detect and block deep fake attacks created using generative artificial intelligence (AI) technologies. The post Nametag Adds Ability to Thwart Deep Fakes to Identity ...

Sectigo SiteLock 2.0 simplifies website protection for SMBs

Sectigo announced SiteLock 2.0, a major upgrade to SiteLock, its website security and protection platform. SiteLock 2.0 is designed to simplify website protection for small to medium-sized businesses (SMBs). At the core of SiteLock 2.0 is Site ...

It’s 2024 and the API Breaches Keep Coming

APIs are built expressly to share a company’s most valuable data and services. This makes them a lucrative target for bad actors. We’ve already hit the tipping point — APIs are now THE way in. Salt Security’s 2024 State of API Security ...

87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113)

Last week, CISA added CVE-2024-23113 – a critical vulnerability that allows unauthenticated remote code/command execution on unpatched Fortinet FortiGate firewalls – to its Known Exploited Vulnerabilities catalog, thus confirming that ...

More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies

The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links to Apollo. The marketing official, a woman ...

Automated vs manual penetration testing – which is best?

Today’s online world is a little like a virtual battlefield, rife with threats and vulnerabilities. So, having a strong cybersecurity posture for your business is crucial. Penetration testing – either automated or manual – is an essential ...

Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection

Nisos Shielded on All Sides: Combining Manual PII Removal and Vulnerability Monitoring to Enhance Executive Protection The availability of sensitive personal data through breaches and its continual sale online exposes individuals—and by ...