Application Security News and Articles


Is Local Government the Latest Big Target for Phishing?

Between May 2023 and May 2024, phishing attacks that target government agencies surged by 360%, with vendor email compromise attacks that mimic trusted third parties more than doubling. In addition, 69% of local government organizations report ...

Internet Archive data breach, defacement, and DDoS: Users’ data compromised

The Internet Archive has suffered a data breach, leading to the compromise of email addresses, screen names and bcrypt password hashes of some 31 million users. The compromise was revealed on Wednesday afternoon, when the digital library’s ...

Qualys Enterprise TruRisk Management unifies asset inventory and risk factors

Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights ...

Adaptiva improves collaboration between IT and security teams with vulnerability dashboards

Adaptiva announces the latest feature release for OneSite Patch: vulnerability dashboards. These new dashboards provide real-time visibility into Common Vulnerabilities and Exposures (CVEs) in the environment and patches that can remediate ...

Secure Your World with Phishing Resistant Passkeys

Secure Your World with Phishing Resistant Passkeys madhav Thu, 10/10/2024 - 05:12 As we celebrate Cybersecurity Awareness Month 2024 with the theme "Secure Our World," exploring innovative technologies is crucial to help us achieve this goal. ...

Widening talent pool in cyber with on-demand contractors

Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many ...

Investing in Privacy by Design for long-term compliance

In this Help Net Security interview, Bojan Belušić, Head of Information Security & IT Operations at Microblink, discusses the relationship between Privacy by Design and regulatory frameworks like GDPR. Integrating privacy principles from ...

Balancing legal frameworks and enterprise security governance

In this Help Net Security interview, Tom McAndrew, CEO at Coalfire, discusses the balance organizations must strike between legal compliance and effective enterprise security governance in the context of evolving regulatory frameworks. McAndrew ...

Consumers have trust issues regarding how AI collects their data

Consumers worldwide are highly concerned about the information companies collect from them – especially when it’s used for AI, according to Cohesity. The majority of respondents (73% in the UK, 81% in the US and 82% in Australia) ...

What lies ahead for AI in cybersecurity

AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, ...

Third-Party Pitfalls: Securing Private Data in Government Operations

The post Third-Party Pitfalls: Securing Private Data in Government Operations appeared first on Votiro. The post Third-Party Pitfalls: Securing Private Data in Government Operations appeared first on Security Boulevard.

Imperva Adaptive Threshold for Layer 7 DDoS Attacks Reduces Risk of Business Disruption

Today’s fast-paced digital landscape demands an optimized user experience that is always available to engage end users. However, businesses are constantly under threat from a variety of attacks that seek to disrupt that experience, including ...

Alarm Management Enhancements

Product Update: Version 4.6 We're thrilled to introduce the latest enhancements in Hyperview v4.6, reinforcing our commitment to delivering innovative solutions and improved functionalities. NEW FEATURE Alarm Event Categories The alarm ...

Update from the Trenches

Ivanti CSA Investigation/Detection Details   Authors: Rui Ataide, Andrew Nelson, and Hermes Bojaxhi GuidePoint Security has recently been engaged on […] The post Update from the Trenches appeared first on Security Boulevard.

USENIX NSDI ’24 – QuickUpdate: A Real-Time Personalization System For Large-Scale Recommendation Models

Ramezani, Fan Wang, Zeliang Chen, Yue Dong, Maomao Ding, Zhiwei Zhao, Zhengyu Zhang, Ellie Wen, Assaf Eisenman Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems ...

Test Data Management & Compliance Challenges For On-Prem Environments

Managing test data in on-prem environments can feel like an uphill battle. As cloud adoption grows, many companies still depend on on-premise environments to handle sensitive, regulated data. This isn’t just a legacy decision—industries like ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #308 – What Are Those?

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

Palo Alto Expedition: From N-Day to Full Compromise

On July 10, 2024, Palo Alto released a security advisory for CVE-2024-5910, a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. While we had never heard of Expedition application before, it’s ...

Digital Crack for Kids: TikTok Sued Again by 14 AGs

For You Plague: TikTok’s in trouble once more—this time, some states complain it’s breaking laws by harvesting children’s data and keeping them addicted. The post Digital Crack for Kids: TikTok Sued Again by 14 AGs appeared first on ...

Microsoft’s October 2024 Patch Tuesday: Addressing 5 Zero-Days and 118 Vulnerabilities

On October 10, 2024, Microsoft released its latest round of security updates as part of the monthly Patch Tuesday. This month’s update addresses a total of 118 vulnerabilities, including five zero-days, two of which are actively being ...