Application Security News and Articles


Newcastle City Council Reduces Java Security Risk with Azul

New Castle City Council significantly reduced their security risk level with Java applications through their strategic partnership with Azul. The post Newcastle City Council Reduces Java Security Risk with Azul appeared first on Azul | ...

The Schedule is Live: The Elephant in AppSec Conference

Explore the agenda of The Elephant in AppSec Conference. Discover expert-led sessions on what's broken in AppSec and how to fix it. Register now! The post The Schedule is Live: The Elephant in AppSec Conference appeared first on Security Boulevard.

Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)

CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known ...

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

San Francisco, United States / California, 3rd October 2024, CyberNewsWire The post Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals appeared first on Security Boulevard.

USENIX NSDI ’24 – GRACE: Loss-Resilient Real-Time Video through Neural Codecs

Authors/Presenters:Yihua Cheng, Ziyi Zhang, Hanchen Li, Anton Arapin, Yue Zhang, Qizheng Zhang, Yuhan Liu, Kuntai Du, Xu Zhang, Francis Y. Yan, Amrita Mazumdar, Nick Feamster, Junchen Jiang Our sincere thanks to USENIX, and the Presenters & ...

The AI Revolution in Search: Navigating the New Frontier of Information Retrieval

The AI revolution is reshaping how we find and interact with information online. From personalized results to natural language processing, discover how AI is revolutionizing search landscape and ushering in a new era of information retrieval. The ...

Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

Singapore, Singapore, 3rd October 2024, CyberNewsWire The post Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions appeared first on Security Boulevard.

Webinar Announcement: Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

Torrance, United States / California, 3rd October 2024, CyberNewsWire The post Webinar Announcement: Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP appeared first on Security Boulevard.

Unmasking the Hack-to-Trade Scheme: A Cautionary Tale for Executives

In a shocking revelation, federal prosecutors have charged UK national Robert B. Westbrook with orchestrating a sophisticated “hack-to-trade” scheme that netted him millions of dollars. By exploiting vulnerabilities in Office365, Westbrook ...

Malwarebytes Browser Guard updates block unwanted and unsafe content

Malwarebytes released new features for Browser Guard, its free browser extension for Chrome, Edge, Firefox, and Safari that blocks content identified as potentially unwanted and unsafe. Users will now receive a pop-up alert if a website was ...

Darktrace brings real-time cloud detection and response to Microsoft Azure customers

Darktrace announced the expansion of Darktrace / CLOUD to support Microsoft Azure environments. The AI-driven Cloud Detection and Response (CDR) system leverages Microsoft’s virtual network flow logs for agentless deployment, slashing ...

CUPS vulnerabilities could be abused for DDoS attacks

While the Common UNIX Printing System (CUPS) vulnerabilities recently disclosed by researcher Simone “evilsocket” Margaritelli are not easily exploited for remote command execution on vulnerable systems, they could offer more ...

Virtual Patching: A Proactive Approach to API Security

In the API-driven world of modern enterprises, security vulnerabilities such as Broken Object Level Authorization (BOLA) represent one of the more insidious threats. These weaknesses are often exploited by attackers through bot-driven automation ...

The AI Threat: Misinformation and the 2024 Elections

The post The AI Threat: Misinformation and the 2024 Elections appeared first on AI-enhanced Security Automation. The post The AI Threat: Misinformation and the 2024 Elections appeared first on Security Boulevard.

Get Ahead of CISA’s New Software Security Acquisition Requirements

On August 1 2024, the CISA-led ICT Supply Chain Risk Management Task Force published a Software Acquisition Guide. This document outlines key questions that an enterprise buyer of software can ask to better govern security risk of their vendors. ...

Legit Posture Score empowers security teams to measure and manage their AppSec posture

Legit Security launched its new “Legit Posture Score,” delivering a dynamic, comprehensive, and fully transparent ASPM rating system. Now security teams can proactively measure and manage their AppSec posture instantly with a holistic ...

2024’s Best Open Source Cybersecurity Tools

There’s a prevailing myth that top-notch security solutions must come with a hefty price tag. Yet, this isn’t necessarily the case. Open-source tools are potent allies in the fight against cyber threats. They offer robust functionality ...

Weird Zimbra Vulnerability

Hackers can execute commands on a remote computer by sending malformed emails to a Zimbra mail server. It’s critical, but difficult to exploit. In an email sent Wednesday afternoon, Proofpoint researcher Greg Lesnewich seemed to largely concur ...

Private US companies targeted by Stonefly APT

Undeterred by the indictment issued against one of its alleged members, North Korean APT group Stonefly (aka APT45) continues to target companies in the US, Symantec threat analysts warned. About Stonefly Also known as Andariel and OnyxFleet, ...

Key Takeaways from the 2024 ESG Report on Non-Human Identity (NHI) Management

For years, Identity and Access Management (IAM) has centered on human identities, built on the assumption that people are the weakest link in the cybersecurity chain. However, the digital landscape has shifted dramatically. Today, the average ...