Application Security News and Articles


Scammers target Airbnb and Booking.com users

ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like Booking.com and Airbnb. They have also increased the sophistication of their ...

New infosec products of the week: October 11, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Action1, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, Frontegg, and Qualys. Qualys Enterprise TruRisk Management unifies asset inventory and ...

How to setup passkeys in Apple Passwords app

Beginning with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Passwords app allows you to manage your passwords, passkeys, and verification codes. Passwords app interface Creating passkeys Passkeys are a password alternative designed to ...

What you need to know to select the right GRC framework, North American Edition

Governance, risk, and compliance (GRC) frameworks help professionals assess an organization’s risk posture, align technological initiatives with business goals, and ensure regulatory compliance. However, choosing the appropriate framework can ...

How AI is being used this 2024 election season

AI has been quite the hot topic this year. It’s no wonder there’s been a lot of discussion, not just about its futuristic potential, but about its impact on the elections. The post How AI is being used this 2024 election season appeared first ...

News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability

Austin, TX, Oct. 10th, 2024, CyberNewswire — SpyCloud, the leader in Identity Threat Protection, announced that its SaaS Investigations solution has been enhanced with identity analytics that illuminate the scope of digital identities and ...

ADDO session: Building observability to increase resiliency

As part of the DevOps and DevSecOps track during Sonatype's 9th All Day DevOps (ADDO) event, AWS Senior Developer Advocate Guillermo Ruiz presented his session titled "Building Observability to Increase Resiliency." Well-applied observability ...

Podcast Episode 20: Interview with Alan Delahunty, his role as Vice President/Commercial Lines Agent

Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and ...

How the Auth0 and Aembit Integration Boosts Non-Human Access Security

3 min read The collaboration automates workload-to-workload access, simplifying security for API connections and reducing the risks associated with credential management. The post How the Auth0 and Aembit Integration Boosts Non-Human Access ...

Remediation vs. Mitigation: The Choice Between Instant or Indirect Action 

Organizations are constantly faced with the challenge of addressing vulnerabilities and threats to maintain a secure environment. Two common strategies to aide in this are remediation and mitigation, both of which aim to reduce risk but with ...

USENIX NSDI ’24 – Resiliency at Scale: Managing Google’s TPUv4 Machine Learning Supercomputer

Authors/Presenters:Yazhou Zu, Alireza Ghaffarkhah, Hoang-Vu Dang, Brian Towles, Steven Hand, Safeen Huda, Adekunle Bello, Alexander Kolbasov, Arash Rezaei, Dayou Du, Steve Lacy, Hang Wang, Aaron Wisner, Chris Lewis, Henri Bahini Our sincere ...

Vulnerability Prioritization & the Magic 8 Ball

Last month marks 25 years of operation for the CVE (Common Vulnerabilities and Exposures) program, launched in September 1999. It’s difficult to imagine a world without CVEs. Much of the “vulnerability management” activities, before the ...

ADDO session: The state of SBOM, what’s coming in standards and regulations

In 2021, the Log4j vulnerability catalyzed the industry to take action to boost the security of open source components. The development community is leading this movement, but governments are also taking notice and writing legislation to regulate ...

Cybersecurity Awareness Month: AI Safety for Friends and Family

This blog is for your friends and family working outside of the security and technical industries. The post Cybersecurity Awareness Month: AI Safety for Friends and Family appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘CIDABM’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘CIDABM’ appeared first on Security Boulevard.

Tonic.ai Product Updates: October 2024

Schedule jobs via the Structural UI, customize your sensitivity scan with expanded options, and process multiple languages in Tonic Textual! The post Tonic.ai Product Updates: October 2024 appeared first on Security Boulevard.

Top 11 Cybersecurity Questions Every CISO Should Be Ready to Answer

Chief Information Security Officers (CISOs) should always anticipate questions that might arise during presentations to senior leaders and corporate boards. Below, we present some typical questions that CISOs should be prepared to answer. We hope ...

Auditing Gradio 5, Hugging Face’s ML GUI framework

This is a joint post with the Hugging Face Gradio team; read their announcement here! You can find the full report with all of the detailed findings from our security audit of Gradio 5 here. Hugging Face hired Trail of Bits to audit Gradio 5, a ...

Qualys Unfurls Risk Operations Center Platform

Qualys this week added a risk operations center (ROC) to its portfolio to make it simpler to identify potential threats to the business and centrally manage remediation efforts. The post Qualys Unfurls Risk Operations Center Platform appeared ...

USENIX NSDI ’24 – MegaScale: Scaling Large Language Model Training to More Than 10,000 GPUs

Authors/Presenters:Ziheng Jiang, Haibin Lin, Yinmin Zhong, Qi Huang, Yangrui Chen, Zhi Zhang, Yanghua Peng, Xiang Li, Cong Xie, Shibiao Nong, Yulu Jia, Sun He, Hongmin Chen, Zhihao Bai, Qi Hou, Shipeng Yan, Ding Zhou, Yiyao Sheng, Zhuo Jiang, ...