Application Security News and Articles
At Seceon’s 2024 Innovation and Certification Days, we had the privilege of hearing from one of our valued partners, Keith Johnson, Executive Vice President of Obviam. Keith shared his journey in cybersecurity and explained why Seceon’s aiXDR ...
Authors/Presenters:Qinghao Hu, Zhisheng Ye, Zerui Wang, Guoteng Wang, Meng Zhang, Qiaoling Chen, Peng Sun, Dahua Lin, Xiaolin Wang, Yingwei Luo, Yonggang Wen, Tianwei Zhang
Our sincere thanks to USENIX, and the Presenters & Authors for ...
If there’s one thing Microsoft, Spotify, Google Voice, and the Bank of England have in common, what would it be? All of them have recently been rocked by a major outage caused by an expired TLS certificate that significantly disrupted their ...
HiddenLayer launched several new features to its AISec Platform and Model Scanner, designed to enhance risk detection, scalability, and operational control for enterprises deploying AI at scale. As the pace of AI adoption accelerates, so do the ...
Netwrix released a new version of Netwrix Threat Manager. The upgrade expands the product’s capabilities to the cloud environment of Microsoft Entra ID (formerly Azure AD) in addition to on-premises instances of Active Directory (AD). Now, ...
New Carbon Footprint Reporting delivers unmatched insights, optimizing sustainability and performance Vancouver, British Columbia, October 9, 2024 – Hyperview, the leading cloud-based data center infrastructure management (DCIM) platform, ...
If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit ...
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
The post Enhancing AD Security Against Password Spraying Attacks appeared first on Security Boulevard.
Enterprise organizations in recent years have come to recognize that attacks targeting software supply chains are a major threat. But the focus has been on attacks involving open-source software, since commercial software is a black box for many ...
The shift to 90-day certificates, Post-Quantum Cryptography (PQC), and crypto agility are interconnected strategies for enhancing cybersecurity. Shortened certificate lifespans improve agility and readiness for PQC, ensuring a seamless transition ...
With the rise of cybersecurity threats, keeping up with industry rules is important but can be difficult. That’s where Strobes Penetration Testing as a Service (PTaaS) comes into play. This...
The post How Strobes Penetration Testing Supports ...
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon ...
Frontegg launched Flows, a journey-time orchestration capability that uses generative AI to simplify the creation of advanced customer identity processes. As growing businesses emerge from startup mode and enter scale-up mode, their user ...
Intel Microcode, a critical component of Intel CPUs, has been found to contain security vulnerabilities. These vulnerabilities could potentially allow attackers to gain unauthorized access to sensitive information or even crash systems. Intel ...
Edgio launched Premier Bot Manager, a next-generation bot management solution designed to protect enterprise applications against increasingly sophisticated automated threats. Premier Bot Manager introduces enhanced detection capabilities, ...
There has been a dramatic rise in e-commerce fraud as the increasing use of AI-generated deepfakes poses an unprecedented security challenge for online merchants.
The post AI-Driven eCommerce Fraud to Top $107 Billion by 2029 appeared first on ...
A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security.
The post iPhone Mirroring Flaw Could Expose Employee Personal ...
Bitwarden expanded its integration capabilities with the release of a Microsoft Sentinel integration to enhance security information and event management (SIEM) for organizations. Security teams can now monitor, detect, and respond to password ...
Trulioo launched Trulioo Fraud Intelligence, a new capability that delivers predictive risk insights across more than 195 countries. Trulioo Fraud Intelligence transforms how global businesses fight synthetic and third-party fraud. The capability ...
SQL has become the standard language for interacting with relational databases. An SQL database uses tables to store and manage structured data with a focus on data integrity and relationships. MySQL, MariaDB, and PostgreSQL are popular SQL ...