Application Security News and Articles


Guide for selecting the right GRC framework, EU edition

Governance, risk, and compliance frameworks are critical. They enable cybersecurity professionals to accurately identify an organization’s risk posture, align business and strategic objectives with technology, and meet compliance ...

Tidal Cyber empowers organizations to improve their protection efforts

Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber ...

Choosing the Right Deployment Option for Your API Security Solution

You need an API security solution. That much is a given (although some may argue it isn’t!). While essential for business growth and innovation, APIs, or Application Programming Interfaces, expose the organizations that use them to cyber ...

Top 10 DMARC Providers in the Market

Reading Time: 9 min Secure your email domain with the top DMARC providers of 2024. Find the best solution for enhanced security and delivery. The post Top 10 DMARC Providers in the Market appeared first on Security Boulevard.

Two Crypto Exchanges Face US Sanctions For Money Laundering

Recent media reports have shed light on the US sanctions that were imposed on two crypto exchanges. In addition, the government also issued an indictment against a Russian national who was involved in money laundering crimes. In this article ...

YARA: Open-source tool for malware research

YARA is a powerful tool designed primarily to aid malware researchers in identifying and categorizing malware samples, though its applications are broader. The tool enables users to create detailed descriptions, or “rules,” for ...

Cultivating a security-first mindset: Key leadership actions

In this Help Net Security interview, Emily Wienhold, Cyber Education Specialist at Optiv, discusses how business leaders can promote a security-first culture within their organizations. Wienhold also discusses strategies for maintaining ongoing ...

NIST CSF 2.0: A CISO’s Guide

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has become one of the most widely adopted standards... The post NIST CSF 2.0: A CISO’s Guide appeared first on Symmetry Systems. The post NIST CSF 2.0: A ...

GoldenJackal APT group breaches air-gapped systems in Europe

ESET researchers have discovered a series of attacks that took place in Europe from May 2022 to March 2024, where the attackers used a toolset capable of targeting air-gapped systems, in a governmental organization of a European Union country. ...

30% of customer-facing APIs are completely unprotected

70% of customer-facing APIs are secured using HTTPS, leaving nearly one-third of these APIs completely unprotected, according to F5. This is a stark contrast to the 90% of web pages that are now accessed via HTTPS, following the push for secure ...

Cybersecurity jobs available right now: October 9, 2024

Cloud Cybersecurity Analyst III Texas Health and Human Services | USA | Hybrid – View job details As a Cloud CSAIII, you will be responsible for designing, implementing, and managing security solutions for cloud environments. You ...

Protecting America’s Water Systems: A Cybersecurity Imperative

America’s water systems are becoming targets for cyberattacks. Cybercriminals and nation-state actors exploit known vulnerabilities, threatening the safety and security of a critical public resource. Recent attacks have highlighted the urgency ...

Best practices for authentication and authorization: Yoshiyuki Tabata’s keynote at ADDO

Authentication (authn) and authorization (authz) are cornerstones of security in cloud-native applications. And yet, they remain some of the most challenging aspects for many organizations today. The post Best practices for authentication and ...

Transforming enterprises with generative AI: Pallavi Nargund’s keynote at ADDO

Generative artificial intelligence (AI) is transforming industries, enabling businesses to harness the power of machine learning (ML) to reshape customer experiences and revolutionize software development. The post Transforming enterprises with ...

Unveiling the trillion dollar engine of innovation: Manuel Hoffmann’s keynote at ADDO

Open source software (OSS) has revolutionized the technology landscape, powering innovations across industries from finance to healthcare. The post Unveiling the trillion dollar engine of innovation: Manuel Hoffmann’s keynote at ADDO ...

Patch Tuesday Update – October 2024

The post Patch Tuesday Update - October 2024 appeared first on Digital Defense. The post Patch Tuesday Update – October 2024 appeared first on Security Boulevard.

A decade of transformation: ADDO and the State of the Software Supply Chain

The software industry has seen remarkable changes over the past decade, driven by a surge in open source adoption, evolving development methodologies, and the growing integration of AI. At this year's All Day DevOps (ADDO) event, a panel of ...

GoldenJackal Targets Embassies, Steals Data from Air-Gapped Systems

GoldenJackal, a threat group possibly from Russia, has been attacking embassies and other government agencies from Europe, South Asia, and the Middle East with two distinct malicious toolsets designed to steal information from air-gapped systems, ...

Revolutionizing software development: Frank Roe’s keynote at ADDO

The world of software development is rapidly evolving, driven by increasing pressure to deliver faster, yet with fewer resources, and the widespread adoption of generative AI tools. The post Revolutionizing software development: Frank Roe’s ...

Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572)

For October 2024 Patch Tuesday, Microsoft has released fixes for 117 security vulnerabilities, including two under active exploitation: CVE-2024-43573, a spoofing bug affecting the Windows MSHTML Platform, and CVE-2024-43572, a remote code ...