Application Security News and Articles


Why is asset deduplication a hard problem?

“If you cannot count it, you cannot manage it.” – Every CISO and CIO ever Asset deduplication is a crucial challenge in exposure management (and CAASM). In today’s complex IT environments, effective management of vulnerabilities and other ...

Randall Munroe’s XKCD ‘Ingredientsl’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Ingredientsl’ appeared first on Security Boulevard.

Escape vs Invicti

Discover why Escape is a better API security solution. The post Escape vs Invicti appeared first on Security Boulevard.

Biggest Ever DDoS is Threat to OT Critical Infrastructure

Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS). The post Biggest Ever DDoS is Threat to OT Critical Infrastructure appeared first on Security Boulevard.

How to Build Cross-Departmental Alliances to Tackle Insider Risk

Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation As a security leader, you have the critical responsibility of protecting your organization from insider ...

Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam

In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was then stolen, according to a report from ...

Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton

At Seceon’s 2024 Innovation and Certification Days, one of the standout sessions was a conversation between Tom Ertel, our SVP of Technical Sales at Seceon, Roger Newton Jr., the brain behind the SOC at Logically. Roger shared some real-world ...

USENIX NSDI ’24 – MadEye: Boosting Live Video Analytics Accuracy with Adaptive Camera Configurations

Authors/Presenters:Mike Wong, Murali Ramanujam, Guha Balakrishnan, Ravi Netravali Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation ...

The best resources for CSAM: Resources to send your team this month

As Cyber Security Awareness Month (CSAM) kicks off, providing your team with accessible, engaging resources for CSAM is a great way to reinforce cybersecurity best practices. The post The best resources for CSAM: Resources to send your team this ...

Latest product updates

All announcements about Acunetix product updates and new releases are now exclusively available on our changelogs page. For each release, we publish notes to announce new features, new security checks, improvements, and bug fixes. Information ...

DOJ, Microsoft Take Down Domains Used by Russian-Backed Group

The DOJ and Microsoft in a joint effort seized dozens of domains from a Russian-based threat group known as Star Blizzard, which for more than a year was targeting civil society groups like NGOs and journalist as well as government agencies in a ...

SonarQube 10.7 Release Announcement

Sonar introduces powerful AI-driven features, expanded support for new and existing languages and frameworks, and deeper security, all to elevate your code quality. These updates bring significant advancements for developers and teams. The post ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/04/24

Insight #1: Every click you make, every vish call you take It's Cybersecurity Awareness Month. What are you doing to prevent phishing attacks this month? In a hyper-connected world, cybersecurity is no longer just an IT issue, but a shared ...

Cybersecurity Snapshot: Many Employees Overshare Work Info with AI Tools, Report Finds, as ‘Cybersecurity Awareness Month’ Kicks Off

Check out the best practices cyber agencies are promoting during Cybersecurity Awareness Month, as a report warns that staffers are feeding confidential info to AI tools. Meanwhile, a study highlights how business decisions can derail OT ...

100+ domains seized to stymie Russian Star Blizzard hackers

Microsoft and the US Justice Department have seized over 100 domains used by Star Blizzard, a Russian nation-state threat actor. “Between January 2023 and August 2024, Microsoft observed Star Blizzard target over 30 civil society ...

The secret to secure DNS? It’s all in the policies

Following our recent investigations into the dangers of subdomain hijacking, we caught up with Prudence Malinki, Head of Industry Relations at Markmonitor, for some wise words of advice on the role policy can play in ensuring your DNS is ...

Cybersecurity in Logistics and Transportation Sector: Key Threats and Challenges

The logistics and transportation sectors are the backbone of global trade, ensuring the seamless movement of goods across borders and industries. However, the increasing reliance on digital technologies, such as IoT devices, GPS tracking, and ...

CentOS vs Ubuntu: Enterprise Linux Comparison

The choice between CentOS vs Ubuntu depends on your specific needs: stability, support, security, and software ecosystem. While Ubuntu receives official support from Canonical, the last supported version of CentOS Linux, CentOS 7, reached end of ...

Why are we still talking about cybersecurity basics after all these years?

Cybersecurity basics remain crucial even after decades. Despite technological advances, simple practices like using strong passwords, enabling MFA, and staying alert to phishing are often overlooked due to our fast-paced lives. Slowing down to ...

Iranian APT Facilitating Remote Access To Target Networks 

As per recent reports, an Iranian Advanced Persistent Threat (APT) hacker is now playing a facilitator role in aiding remote access to target networks. The Iranian APT hacker is believed to have affiliations with the Ministry of Intelligence and ...