Application Security News and Articles


10 Essential Python HTTP Tips to Boost Your Code’s Security

Learn how to use Python’s `requests` library to improve network request security and stability, from timeouts to session management and…Continue reading on Top Python Libraries »

Akamai Embeds API Security Connector in CDN Platform

Akamai Technologies has made available at no extra cost a connector that makes it simpler for cybersecurity teams to discover application programming interfaces (APIs) that organizations have exposed via its content delivery network (CDN). The ...

8 Best Cyber Risk Mitigation Tools You Should Know

Cyber risk mitigation is an ongoing process that aims to reduce the impact of cyber threats on your organization. It encompasses various strategies and tools designed to safeguard your systems and data from potential attacks. A well-crafted cyber ...

Critical Skills Gap in AI, Cloud Security

There is a growing disconnect between the increasing sophistication of cybersecurity threats and the preparedness of IT teams to combat them, according to an O’Reilly study of more than 1300 IT professionals. The post Critical Skills Gap in AI, ...

How DNS Configurations Impact Your Email Security: Answering Your Webinar Questions

During our latest webinar, “How DNS Configurations Impact ... The post How DNS Configurations Impact Your Email Security: Answering Your Webinar Questions appeared first on EasyDMARC. The post How DNS Configurations Impact Your Email Security: ...

How to Prepare Identity Stack to Adopt the Zero-Trust Model

The zero-trust model demands robust identity security, which needs continuous verification of individuals and systems. The post How to Prepare Identity Stack to Adopt the Zero-Trust Model appeared first on Security Boulevard.

How Malware is Evolving: Sandbox Evasion and Brand Impersonation 

Attackers are constantly seeking new methods to evade detection by antivirus, endpoint detection and response (EDR) tools, and sandbox environments. Malware creators are now using a combination of brand impersonation and sandbox evasion ...

The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface ...

Transforming cloud security with real-time visibility

In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and multi-cloud environments. He outlines the need for deep visibility into configurations and real-time insights to ...

Rspamd: Open-source spam filtering system

Rspamd is an open-source spam filtering and email processing framework designed to evaluate messages based on a wide range of rules, including regular expressions, statistical analysis, and integrations with custom services like URL blacklists. ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines

In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The conversation highlights the ...

SOC teams are frustrated with their security tools

Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust ...

Meet the shared responsibility model with new CIS resources

You can’t fulfill your end of the shared responsibility model if you don’t emphasize secure configurations. Depending on the cloud services you’re using, you’re responsible for configuring different things. Once you figure ...

How Cybercriminals Use Stolen Data to Target Companies — A Deep Dive into the Dark Web

The digital world has revolutionized the way we live and work, but it has also opened up a new realm for cybercriminals. The rise of the dark web has provided a breeding ground for hackers and other malicious actors to trade stolen data and ...

USENIX NSDI ’24 – Credence: Augmenting Datacenter Switch Buffer Sharing with ML Predictions

Authors/Presenters:Vamsi Addanki, Maciej Pacut, Stefan Schmid Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, ...

Learning from the NASCIO Annual Conference 2024

The National Association of State CIOs (NASCIO) held its annual conference in New Orleans, La., this past week. Here are some of the highlights, along with some thoughts about what the future holds for state CIOs. The post Learning from the ...

Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: October 2024 Patch Tuesday forecast: Recall can be recalled October arrived, and Microsoft started the month by announcing the release of ...

ARTEMIS: Adaptive Bitrate Ladder Optimization for Live Video Streaming

Authors/Presenters:Farzad Tashtarian, Abdelhak Bentaleb, Hadi Amirpour, Sergey Gorinsky, Junchen Jiang, Hermann Hellwagner, Christian Timmerer Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX ...

SOC 2 or ISO 27001 – Which One Do You Need?

In the wide world of information security, there are many different frameworks, standards, and systems in use to help assume a secure stance against threats. Two commonly seen frameworks are SOC 2 and ISO 27001. How do these two stand in ...

USENIX NSDI ’24 – Gemino: Practical and Robust Neural Compression for Video Conferencing

Authors/Presenters:Vibhaalakshmi Sivaraman, Pantea Karimi, Vedantha Venkatapathy, Mehrdad Khani, Sadjad Fouladi, Mohammad Alizadeh, Frédo Durand, Vivienne Sze Our sincere thanks to USENIX, and the Presenters & Authors for publishing their ...