Application Security News and Articles


Partner Spotlight: Why Obviam Chose Seceon for AI-Driven XDR

At Seceon’s 2024 Innovation and Certification Days, we had the privilege of hearing from one of our valued partners, Keith Johnson, Executive Vice President of Obviam. Keith shared his journey in cybersecurity and explained why Seceon’s aiXDR ...

USENIX NSDI ’24 – Characterization of Large Language Model Development in the Datacenter

Authors/Presenters:Qinghao Hu, Zhisheng Ye, Zerui Wang, Guoteng Wang, Meng Zhang, Qiaoling Chen, Peng Sun, Dahua Lin, Xiaolin Wang, Yingwei Luo, Yonggang Wen, Tianwei Zhang Our sincere thanks to USENIX, and the Presenters & Authors for ...

Don’t Let an Expired Certificate Cause Critical Downtime. Prevent Outages with a Smart CLM

If there’s one thing Microsoft, Spotify, Google Voice, and the Bank of England have in common, what would it be? All of them have recently been rocked by a major outage caused by an expired TLS certificate that significantly disrupted their ...

HiddenLayer enhances risk detection for enterprise AI models

HiddenLayer launched several new features to its AISec Platform and Model Scanner, designed to enhance risk detection, scalability, and operational control for enterprises deploying AI at scale. As the pace of AI adoption accelerates, so do the ...

Netwrix Threat Manager 3.0 prevents improper changes in Microsoft Entra ID

Netwrix released a new version of Netwrix Threat Manager. The upgrade expands the product’s capabilities to the cloud environment of Microsoft Entra ID (formerly Azure AD) in addition to on-premises instances of Active Directory (AD). Now, ...

Hyperview Revolutionizes Data Center Management with Advanced DCIM Suite

New Carbon Footprint Reporting delivers unmatched insights, optimizing sustainability and performance Vancouver, British Columbia, October 9, 2024 – Hyperview, the leading cloud-based data center infrastructure management (DCIM) platform, ...

Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)

If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit ...

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls. The post Enhancing AD Security Against Password Spraying Attacks appeared first on Security Boulevard.

5 commercial software attacks — and what you can learn from them

Enterprise organizations in recent years have come to recognize that attacks targeting software supply chains are a major threat. But the focus has been on attacks involving open-source software, since commercial software is a black box for many ...

Why 90-Day certificates, PQC, and crypto agility are more interconnected than you think

The shift to 90-day certificates, Post-Quantum Cryptography (PQC), and crypto agility are interconnected strategies for enhancing cybersecurity. Shortened certificate lifespans improve agility and readiness for PQC, ensuring a seamless transition ...

How Strobes Penetration Testing Supports Compliance Audits and Assessments

With the rise of cybersecurity threats, keeping up with industry rules is important but can be difficult. That’s where Strobes Penetration Testing as a Service (PTaaS) comes into play. This... The post How Strobes Penetration Testing Supports ...

Commvault Cloud Rewind helps businesses bounce back from cyber incidents

Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon ...

Frontegg Flows simplifies customer identity processes

Frontegg launched Flows, a journey-time orchestration capability that uses generative AI to simplify the creation of advanced customer identity processes. As growing businesses emerge from startup mode and enter scale-up mode, their user ...

Extended Support for Ubuntu: Patch Intel Microcode Vulnerabilities

Intel Microcode, a critical component of Intel CPUs, has been found to contain security vulnerabilities. These vulnerabilities could potentially allow attackers to gain unauthorized access to sensitive information or even crash systems.   Intel ...

Edgio Premier Bot Manager detects, classifies and mitigates bot traffic

Edgio launched Premier Bot Manager, a next-generation bot management solution designed to protect enterprise applications against increasingly sophisticated automated threats. Premier Bot Manager introduces enhanced detection capabilities, ...

AI-Driven eCommerce Fraud to Top $107 Billion by 2029

There has been a dramatic rise in e-commerce fraud as the increasing use of AI-generated deepfakes poses an unprecedented security challenge for online merchants. The post AI-Driven eCommerce Fraud to Top $107 Billion by 2029 appeared first on ...

iPhone Mirroring Flaw Could Expose Employee Personal Information

A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security. The post iPhone Mirroring Flaw Could Expose Employee Personal ...

Bitwarden integrates with Microsoft Sentinel to strengthen real-time threat detection

Bitwarden expanded its integration capabilities with the release of a Microsoft Sentinel integration to enhance security information and event management (SIEM) for organizations. Security teams can now monitor, detect, and respond to password ...

Trulioo Fraud Intelligence fights fraud during onboarding

Trulioo launched Trulioo Fraud Intelligence, a new capability that delivers predictive risk insights across more than 195 countries. Trulioo Fraud Intelligence transforms how global businesses fight synthetic and third-party fraud. The capability ...

Understanding Your SQL Database: A Comprehensive Guide

  SQL has become the standard language for interacting with relational databases. An SQL database uses tables to store and manage structured data with a focus on data integrity and relationships. MySQL, MariaDB, and PostgreSQL are popular SQL ...