Application Security News and Articles


CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber attacks. ...

Vulnerability in Telegram app for Android allows sending malicious files disguised as videos

ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from June 2024. Example of how the EvilVideo exploit appears on Telegram ...

CISA and FBI Issue Alert on OS Command Injection Vulnerabilities

CISA and FBI issued a critical advisory on July 10, 2024, urging software companies to review their products and eliminate OS command injection vulnerabilities at the source. This urgent call comes in the wake of recent attacks that exploited ...

Rezonate Streamlines Identity Security Across IT Environments

Rezonate has extended the reach of its platform for managing access to infrastructure to include the credentials that are used by humans alongside the identifies of machines and software components that organizations need to track to ensure ...

Gcore raises $60 million to drive AI innovation

Gcore has secured $60 million in Series A funding from institutional and strategic investors. Led by Wargaming, and with participation from Constructor Capital and Han River Partners, this marks the company’s first external capital raise since ...

TuxCare Answers Urgent Needs for Enterprises Facing Spring Framework End of Life

PALO ALTO, Calif. – July XX, 2024 – TuxCare, a global innovator in cybersecurity for Linux, today announced that its new Extended Lifecycle Support for Spring powered by TuxCare’s SecureChain for Java will become available to customers on ...

Spanish-Speaking Victims Targeted In Poco RAT Attacks

Recent media reports have stated that Spanish victims have now become the target of an email phishing campaign. The Poco RAT attacks campaign is known for delivering a new remote access trojan since February 2024. As of now, various industries ...

Global Outage: What Went Wrong with Microsoft?

July 19, 2024: A large outage affects Microsoft services around the world. This disruption impacted a number of services, among which Microsoft 365 (Office 365 as well as Teams, Outlook, and SharePoint), Azure cloud services but also some other ...

The CISO’s approach to AI: Balancing transformation with trust

As organizations increasingly adopt third-party AI tools to streamline operations and gain a competitive edge, they also invite a host of new risks. Many companies are unprepared, lacking clear policies and adequate employee training to mitigate ...

10 fintech companies to watch in 2024

The fintech market is experiencing a swift transformation driven by emerging technologies like Open Finance and GenAI, as highlighted by Juniper Research. This evolution is compounded by intense competition to become customers’ preferred ...

5 Ways Generative AI is Revolutionizing Cybersecurity Defense

Emerging at the forefront of technological innovation, Generative AI is reshaping the landscape of cybersecurity defense with groundbreaking advancements. This blog delves into 5 Ways Generative AI is Revolutionizing Cybersecurity Defense and how ...

Despite economic uncertainty, organizations are prioritizing SaaS security investments

In this Help Net Security video, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the key findings of their recent annual SaaS Security Survey Report, conducted in partnership with the Cloud Security Alliance (CSA). Seventy percent of ...

Confidential AI: Enabling secure processing of sensitive data

In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential computing, particularly at the silicon level, enhances data protection for ...

Using SAST and MISRA Memory Safety Standards to Prevent the Next CrowdStrike Debacle

The Problem A common coding error in a CrowdStrike Falcon update caused critical system outages around the world starting on Friday July 19th 2024. The culprit? A Null Pointer Dereference (also known as CWE-476) in a piece of C++ program that ...

In Response to the Microsoft-CrowdStrike Incident: July 2024

The post In Response to the Microsoft-CrowdStrike Incident: July 2024 appeared first on Votiro. The post In Response to the Microsoft-CrowdStrike Incident: July 2024 appeared first on Security Boulevard.

Firmware, Supply Chain, and Frameworks – NIST SP 800-53

NIST Special Publication 800-53 rev 5, Security and Privacy Controls for Information Systems and Organizations, is one of the most important and influential documents in cybersecurity today. Read More > The post Firmware, Supply Chain, and ...

New Microsoft Recovery Tool for CrowdStrike Issue on Windows Endpoints

  Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints: Here is the link to the Microsoft Tech Community ...

3 Components of a Proactive Security Strategy 

The post 3 Components of a Proactive Security Strategy  appeared first on Digital Defense. The post 3 Components of a Proactive Security Strategy  appeared first on Security Boulevard.

The Future of AI and Its Impact on Humanity

As AI continues to advance at a rapid pace, its potential to revolutionize various aspects of human life grows exponentially. From healthcare and education to transportation and employment, artificial intelligence is poised to reshape our world ...

SPF, DKIM, DMARC Setup Guide for Google Workspace

Google Workspace, formerly known as G Suite, is ... The post SPF, DKIM, DMARC Setup Guide for Google Workspace appeared first on EasyDMARC. The post SPF, DKIM, DMARC Setup Guide for Google Workspace appeared first on Security Boulevard.