Application Security News and Articles


Internet Archive is Attacked and 31 Million Files Stolen

A user authentication database was stolen from the nonprofit , which also was been beset by a series of DDoS attacks, and a pro-Palestinian threat group has taken credit for the attacks and the data breach. The post Internet Archive is Attacked ...

Understanding Security Needs at Security Field Day 12

Security Field Day 12 will take place October 16-17, 2024. You can watch the live-streaming video right here on the Techstrong family of sites or on the Tech Field Day website. The post Understanding Security Needs at Security Field Day 12 ...

Technical Analysis of DarkVision RAT

IntroductionDarkVision RAT is a highly customizable remote access trojan (RAT) that first surfaced in 2020, offered on Hack Forums and their website for as little as $60. Written in C/C++, and assembly, DarkVision RAT has gained popularity due to ...

Real-Time Security for Developers with GitGuardian’s Extension for Visual Studio Code

Enhance your secure coding practices with GitGuardian’s Visual Studio Code extension. Detect secrets in real-time by embedding security into developers' workflows, boosting productivity and ensuring compliance. The post Real-Time Security for ...

ESET updates Vulnerability and Patch Management module

ESET released its updated ESET Vulnerability and Patch Management module. With the new update, ESET V&PM has expanded to support Linux1 (desktops and servers), as well as macOS2 devices, covering broader parts of a business’ ecosystem. ...

Is AWS Access Analyzer a Solution for Unused Identities?

Exploring Practical Steps for Cleaning up Identity Sprawl A lot of security tools act like finding the list of unused identities is the hard part. The reality, however, is that running a scan takes 30 seconds to uncover a year’s worth of work. ...

CIOs Sound Alarm on Network Security in AI Era

The increasing integration of AI and bandwidth-heavy applications is complicating network environments and making them a greater focus for C-suite leaders, according to a report by Extreme Networks. The post CIOs Sound Alarm on Network Security ...

Simbian unveils AI Agents to address the top pain points for SOC analysts

Simbian announced a suite of AI Agents that work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program. The suite of AI Agents, which runs on the Simbian Security Accelerator Platform, ...

2024 GigaOm Radar for SaaS Security Posture Management (SSPM) Report

In the fast-paced world of SaaS, productivity gains can come at a cost. With enterprises using over 100 different SaaS applications on average, many organizations find themselves in an unmanaged landscape, leaving critical data—and customer ...

Flash Sales, Sneaker Drops, and Concert Tickets: Protecting Your Applications, APIs, and Bottom Line

Flash sales, hype sales, and online product launches – like limited-edition sneakers – generate interest, excitement, and high demand from customers, so naturally they have also become a target for cyberattacks. These events often involve ...

Ketch Third Party Risk Intelligence provides control over trackers, tags, and cookies

Ketch launched Third Party Risk Intelligence, a new suite of diagnostics and management tools for brands to manage how third party vendors collect data across digital properties. As regulatory enforcement increases and wiretapping lawsuits surge, ...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

Austin, TX, USA, 10th October 2024, CyberNewsWire The post SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution appeared first on Security ...

Cybersecurity Awareness Month: The noble work of repeated reminders

Author: Aaron Walton, Threat Intelligence Analyst, Expel Another October. Another Cybersecurity Awareness Month. And, in the thick of the mundane […] The post Cybersecurity Awareness Month: The noble work of repeated reminders appeared first on ...

AppOmni Named a Leader in the 2024 GigaOm Radar for SSPM

This blog discusses why GigaOm identified AppOmni as a leader in SaaS Security Posture Management (SSPM) and all the capabilities the platform provides. The post AppOmni Named a Leader in the 2024 GigaOm Radar for SSPM appeared first on ...

Attacks on GenAI Models Can Take Seconds, Often Succeed: Report

A study by Pillar Security found that generative AI models are highly susceptible to jailbreak attacks, which take an average of 42 seconds and five interactions to execute, and that 20% of attempts succeed. The post Attacks on GenAI Models Can ...

watchTowr raises $19 million to accelerate global growth

watchTowr announced a $19 million Series A funding round led by Peak XV, formerly known as Sequoia India & Southeast Asia, with repeat participation from Prosus Ventures and Cercano Management. The company will use the funds to capture ...

Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)

Mozilla has pushed out an emergency update for its Firefox and Firefox ESR browsers to fix a vulnerability (CVE-2024-9680) that is being exploited in the wild. About CVE-2024-9680 Reported by ESET malware researcher Damien Schaeffer, ...

Fivecast Discovery drives better analytical outputs

Responding directly to an increased global threat environment, Fivecast launched a Discovery solution that empowers analysts and investigators across both the Government and Corporate sectors to uncover intelligence insights faster to help ...

List of Cybersecurity Initiatives by the Government of India

With the rapid digital transformation across sectors, India has become a hub for technology, innovation, and digital infrastructure. Nevertheless, this transformation is accompanied by a high level of cyber threats and risks implying ...

5 Disadvantages of Technology in Education

Technology has seeped its way into every facet of today’s education environment. Students rely on it for their learning, educators for planning and teaching, parents for communication, and institutions for administration. While it offers many ...