Application Security News and Articles


Ubuntu Fixes Multiple PHP Vulnerabilities: Update Now

Multiple security vulnerabilities were identified in PHP, a widely-used open source general purpose scripting language which could compromise the security and integrity of web applications. These vulnerabilities include incorrect parsing of ...

Calix enhances SmartHome to improve protection for residential subscribers

Calix announced significant updates to Calix SmartHome that will help broadband service providers (BSPs) meet every home internet need with enhanced security and comprehensive offerings. These SmartHome innovations make it easier for BSPs to ...

A Deep Dive into DDoS Carpet-Bombing Attacks

With the rapid growth of the internet, especially in areas like cloud computing, 5G, and IoT technologies, the scale of botnets continues to expand, intensifying the battle between attack and defense. In response, DDoS attacks have evolved, ...

Netwrix appoints Grady Summers as CEO

Netwrix announced that Grady Summers has been appointed CEO effective immediately. Summers succeeds Steve Dickson, who has successfully led the company through record growth during his six-year tenure. Under Dickson’s leadership, Netwrix ...

North Korean Hackers Use New Backdoor And RAT For Attacks

As per recent reports, North Korean hackers have been observed using a new backdoor and remote access trojan as part of their attack campaign. VeilShell, the new tool, is primarily being used to target Southeast Asian countries. In this article, ...

How DDoS Botent is used to Infect your Network?

DDoS botnet gained attention a few years ago due to its record-breaking attacks, but the emergence of new threats in 2024 illustrates the evolving tactics of cyber attackers. The cyber threat landscape is in constant flux, with vulnerabilities ...

Static Application Security Testing (SAST) in DevSecOps Simplified

If you’re working in DevSecOps or aiming to become a DevSecOps engineer, chances are you’ve encountered the term Static Application…Continue reading on Medium »

The NHI management challenge: When employees leave

An employee is exiting your organization. Regardless of the terms of departure, an ex-staffer has the potential when they leave or change roles to impact a wide range of non-human identities, digital credentials, and other secrets. Those secrets ...

How nation-states exploit political instability to launch cyber operations

In this Help Net Security interview, Ismael Valenzuela, Vice President of Threat Research & Intelligence at BlackBerry, discusses the impact of geopolitical tensions on the frequency and sophistication of cyberattacks. He explains how ...

The dark side of API security

APIs are the backbone of digital transformation efforts, connecting applications across organizations, so their security is of the utmost importance. In this Help Net Security video, Lori MacVittie, a Distinguished Engineer at F5, discusses the ...

Data breaches trigger increase in cyber insurance claims

Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1 ...

How to create verification codes in Apple Passwords app

Starting with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Apple Passwords app enables you to manage your passwords, passkeys, and verification codes. For websites and apps that support two-factor (2FA) or multi-factor authentication ...

Unlocking Proactive Compliance with Adobe’s Common Controls Framework

TechSpective Podcast Episode 141 I had the pleasure of speaking with Devansh Sharma, Senior Security and Compliance Product Owner at Adobe, about a game-changing approach to security and compliance: Adobe’s Common Controls Framework (CCF). If ...

USENIX NSDI ’24 – CHISEL: An Optical Slice of the Wide-Area Network

Authors/Presenters:Abhishek Vijaya Kumar, Bill Owens, Nikolaj Bjørner, Binbin Guan, Yawei Yin, Paramvir Bahl, Rachee Singh Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on ...

U.S. Lawmakers, White House Move to Stem China Cyberthreat

Two U.S. House committees want more information about the hack by China threat group Salt Typhoon into the networks of AT&T, Verizon, and Lumen while the White House reportedly is creating an emergency group to respond to expanding ...

Imperva Defends Against Targeted Exploits Used By APT29 Hackers

Recently, U.S. and U.K. cyber agencies have warned of a renewed wave of attacks led by Russian APT29 hackers. These sophisticated threat actors have been actively exploiting vulnerabilities in Zimbra Collaboration Suite and JetBrains TeamCity, ...

Daniel Stori’s Turnoff.US: ‘My Sweet ML Model’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘My Sweet ML Model’ appeared first on Security Boulevard.

IBM X-Force Security Report Spotlights Lack of Cloud Security Fundamentals

A report finds a third (33%) of the cloud security incidents investigated by IBM Security X-Force researchers, involved phishing attacks to steal credentials, followed closely by 28% of incidents that involved attacks where cybercriminals had ...

DOJ Created NexFundAI Crypto Firm in Crypto Scamming Sting

The DOJ created NexFundAI, a false cryptocurrency company and token, in a sting that nabbed 19 people and companies accused of scamming investors by falsely creating the illusion of activity around their crypto and then selling at the inflated ...

USENIX NSDI ’24 – Application-Level Service Assurance with 5G RAN Slicing

Authors/Presenters:Arjun Balasingam, Manikanta Kotaru, Paramvir Bahl Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) ...