Application Security News and Articles


Seeing the Unseen: Salt Security and eBPF

APIs are crucial in our digital world, but they also introduce new vulnerabilities. Attackers often exploit these vulnerabilities by concealing malicious payloads within encrypted traffic, rendering them undetectable to traditional security ...

API Gateways and API Protection: What’s the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems. Because of their prevalence and importance, they are also under attack by actors exploiting ...

USENIX NSDI ’24 – The Eternal Tussle: Exploring the Role of Centralization in IPFS

Authors/Presenters:Yiluo Wei, Dennis Trautwein, Yiannis Psaras, Ignacio Castro, Will Scott, Aravindh Raman, Gareth Tyson Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked ...

Balbix D3: A New Dawn for Faster Burndown of Exposures and Vulnerabilities

Cybersecurity is a race against time. With attackers becoming increasingly sophisticated, the ability to identify, prioritize, and mitigate vulnerabilities faster than adversaries can exploit them is paramount. While visibility into exposures and ...

Cybersecurity Awareness Month: Building a safer digital world together

As we enter October, we once again recognize national Cybersecurity Awareness Month, a pivotal initiative to raise awareness about the importance of securing our digital world. The post Cybersecurity Awareness Month: Building a safer digital ...

Halcyon offers ransomware protection for Linux environments

As an integral part of the Halcyon Anti-Ransomware Platform, Halcyon Linux offers protection against ransomware attacks targeting Linux systems. While ransomware operators were once almost exclusively focused on targeting Windows environments, ...

Exabeam introduces AI-driven LogRhythm Intelligence

Exabeam announced its first quarterly product release since merging with LogRhythm. The latest innovations provide global customers with increased flexibility to choose the security solutions that best meet their specific needs based on ...

Red Sift Radar diagnoses issues through AI-powered insights

Red Sift launched Red Sift Radar, the upskilled LLM assistant that identifies and diagnoses misconfigurations and exposures across email, domains, and internet-facing assets, supporting security teams to prevent incidents before they happen. ...

Veeam Recon Scanner identifies adversary tactics, techniques, and procedures

Veeam Software announced the addition of new Veeam Recon Scanner technology to Veeam Data Platform. This technology, developed by Coveware by Veeam, draws on years of experience in cyber-extortion incident response and the largest database of ...

RSA and Swissbit join forces to secure government agencies

RSA and Swissbit announced that RSA will start introducing its next-generation hardware authenticators RSA iShield Key 2 series powered by Swissbit alongside RSA ID Plus for Government. Built to meet the highest security standards, the RSA ...

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

Takeaways from OWASP Global AppSec SF 2024, covering security tools, AI risks, and strategies for improving application security while empowering developers. The post OWASP Global AppSec SF 2024: Empowering Developer Security As A Community ...

Securing the software supply chain with the SLSA framework

By Cliff Smith Software supply chain security has been a hot topic since the Solarwinds breach back in 2020. Thanks to the Supply-chain Levels for Software Artifacts (SLSA) framework, the software industry is now at the threshold of sustainably ...

Dragos acquires Network Perception to boost security in OT environments

Dragos announced the acquisition of Network Perception, makers of NP-View, a network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and ...

Exabeam Brings AI Security Operations to On-Premises, Cloud Native and Hybrid Environments

Security operations platform provider Exabeam announced its first product release since acquiring LogRhythm earlier this year, a provider of self-hosted and cloud-native SIEM platforms, log management, network monitoring and behavior and security ...

ConnectSecure unveils M365 Assessment Module to help MSPs identify security weaknesses

ConnectSecure launched its new Microsoft 365 (M365) Assessment module. The solution empowers MSPs with greater visibility into Microsoft 365 configurations, offering real-time monitoring of changes and improving security controls. As the most ...

Five Eyes Agencies Put Focus on Active Directory Threats

The U.S. and its Five Eyes alliance partners are warning enterprises techniques threat actors use to target Microsoft's Active Directory and ways that they can detect and mitigate such attacks. The post Five Eyes Agencies Put Focus on Active ...

When hackers get hacked: Sam Curry on his career — and his latest research

The post When hackers get hacked: Sam Curry on his career — and his latest research appeared first on Security Boulevard.

Use Windows event logs for ransomware investigations, JPCERT/CC advises

The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware ...

CISA and FBI Issue Alert on XSS Vulnerabilities

Cross-site scripting (XSS) vulnerabilities continue to be a major concern in today’s software landscape, despite being preventable. CISA and FBI have issued a Secure by Design alert to reduce the prevalence of these vulnerabilities. While XSS ...

OWG Parallax Private Cloud Desktop simplifies business operations

OWG unveiled Parallax Private Cloud Desktop to provide businesses with IT solutions that ensure efficiency, security, and scalability. This next-generation cloud platform is engineered to meet the most stringent security protocols, empowering ...