Application Security News and Articles


Security Alert: Fake Accounts Threaten Black Friday Gaming Sales

As Black Friday 2024 nears, online retailers are preparing for a surge in demand, particularly for deals, discounts, and bundles on popular gaming consoles like the PS5, Xbox, and Nintendo Switch, along with their accessories. However, this ...

Extension Functions in Kotlin

Unlocking the Power of Extension Functions in KotlinContinue reading on Medium »

How Veriti Evolves Vulnerability Management Into Exposure Management which we believe aligns with the Gartner® approach 

Effective vulnerability management has moved from a reactive process to a proactive, strategic imperative. Gartner 2024 report, How to Grow Vulnerability Management Into Exposure Management, says “Creating prioritized lists of security ...

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Hold on, let’s guess.  You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of... The post Cloud Pentesting 101: What to Expect from a ...

Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage

With Scytale's new partnership program, MSPs can seamlessly scale compliance offerings to their clients and increase efficiency. The post Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance ...

How Cloud Monitor Helps Centennial School District Combat Account Takeovers

In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 technology staff can use to prepare for hidden digital threats. Our guest speakers Sal Franco, IT Director at Buckeye ...

What Is The Content Delivery & Security Association (CDSA)?

The Content Delivery & Security Association (CDSA) has long been a cornerstone in the media and entertainment industries. It ensures that the highest content security and delivery standards are met. As the digital landscape continues to ...

Navigating the compliance labyrinth: A CSO’s guide to scaling security

Imagine navigating a labyrinth where the walls constantly shift, and the path ahead is obscured by fog. If this brings up a visceral image, you’ve either seen David Bowie’s iconic film or are very familiar with the real-world challenge of ...

Transforming code scanning and threat detection with GenAI

In this Help Net Security interview, Stuart McClure, CEO of Qwiet AI, discusses the evolution of code scanning practices, highlighting the shift from reactive fixes to proactive risk management. McClure also shares his perspective on the future ...

Why It’s Time to Leave Twitter

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and ...

Evaluating GRC tools

According to Gartner, the broad range of pricing for government, risk, and compliance (GRC) tools requires enterprise risk management (ERM) leaders to be well-versed in distinct pricing tiers of GRC solutions. In this Help Net Security video, ...

ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps

ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Agency (CISA) created to automatically evaluate Microsoft 365 (M365) configurations for potential security gaps. ScubaGear analyzes an organization’s M365 tenant ...

How and where to report cybercrime: What you need to know

Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online fraud, identity theft, and other cyber-related offenses. Victims are usually instructed to ...

Analyzing JtR’s Tokenizer Attack (Round 1)

Introduction / Goals / Scope: This is a follow-up to my previous blog post looking at how to install/run the new John the Ripper Tokenizer attack [Link]. The focus of this post will be on performing a first pass analysis about how the Tokenizer ...

DEF CON 32 – Process Injection Attacks With ROP

Authors/Presenters: Bramwell Brizendine, Shiva Shashank Kusuma Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

Connecting, Collaborating, and Celebrating: Our Global Team Seminar in the South of France

Last September, GitGuardian brought together its 150 Guardians from around the world for a three-day seminar on the beautiful Giens Peninsula in the south of France. The post Connecting, Collaborating, and Celebrating: Our Global Team Seminar in ...

Advanced Strategies for SAST Scanning in CI/CD Pipelines in the Age of AI

Optimising SAST scanning in CI/CD pipelines for greater security, agility, and developer productivityContinue reading on Medium »

Week in review: Microsoft patches actively exploited 0-days, Amazon and HSBC employee data leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) November 2024 Patch Tuesday is here, and Microsoft has dropped ...

DEF CON 32 – Sudos And Sudon’ts: Peering Inside Sudo For Windows

Authors/Presenters: Michael Torres Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Cyber Crisis Management Plan: Shield for Brand Reputation

Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...