Application Security News and Articles


51% of enterprises experienced a breach despite large security stacks

Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, ...

New infosec products of the week: April 19, 2024

Here’s a look at the most interesting products from the past week, featuring releases from IDnow, Immuta, Privacera, Redgate, ShadowDragon, and Tanium. ShadowDragon Horizon enhancements help users conduct investigations from any device Horizon ...

NTA Email Alert Configuration

There are two separate email configurations on NTA which do not affect each other. One is the region/IP group email alert, the other is the global email alert. 1.  Region/IP Group Email Alert Configuration -> Objects -> Regions -> ...

The Ultimate Guide to SBIR and STTR Program Budgeting

The world advances based on innovation, and innovation can come from anywhere. The trouble is that the current capitalist economic system encourages large corporations to play conservatively with their products and their budgets while working to ...

Finding Losses in Gains: Loss of Funds in Forks of Gains Network

Zellic Security Advisory The post Finding Losses in Gains: Loss of Funds in Forks of Gains Network appeared first on Security Boulevard.

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an urgent need to improve security measures in AI development. The post Vulnerabilities for AI and ...

Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web

Headlines about ransomware in recent years has focused on the most prolific gangs like LockBit, BlackCat, and Cl0p and the rise of ransomware-as-a-service (RaaS), where affiliates pay fee to use ransomware developed by another group and share the ...

Companies Didn’t Prioritize Third-Party Sources of CVEs, Here’s What Happened

Last December, Veracode reported that more than a third of Java applications still use vulnerable versions of the Log4j Java logging library. This after many engineering teams dropped their regular work and spent their time remediating the ...

What Makes Containers Vulnerable?

Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first on Mend. The post What Makes Containers Vulnerable? appeared first on Security Boulevard.

USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers

Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from ...

DevOps pioneers navigate organizational transformation

The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into how DevOps pioneers are catalyzing significant shifts within organizations. The post DevOps pioneers ...

To Breach or Not to Breach

The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most critical cloud security technologies is woefully ineffective. In addition to efficacy, it is critical to measure operational ...

Randall Munroe’s XKCD ‘Eclipse Path Maps’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Eclipse Path Maps’ appeared first on Security Boulevard.

What to Consider When Choosing a Software Composition Analysis (SCA) Tool

Given the widespread use of third-party components in application development, identifying and remediating code vulnerabilities as early in development as possible is critical. As a result, many organizations turn to SCA tools, however ...

House Passes Privacy-Preserving Bill, but Biden Blasts it

Are you a FANFSA fan? The White House isn’t. It says the bill “threatens national security.” The post House Passes Privacy-Preserving Bill, but Biden Blasts it appeared first on Security Boulevard.

DataDome Renews SOC 2 Type 2 Compliance

DataDome's SOC 2 Type 2 compliance has been renewed for another year, further underlining that our security controls for customer data align with the AICPA's SOC 2 standard. The post DataDome Renews SOC 2 Type 2 Compliance appeared first on ...

Fixing a $12bn Challenge for Banks Through Data-Centric Security

The challenges presented by cyber risk have always loomed large for IT and business leaders in financial services. But today they have arguably reached a tipping point. The International Monetary Fund (IMF) devotes a whole chapter to the topic in ...

USENIX Security ’23 – Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security

Authors/Presenters: *Alden Hilton, Casey Deccio, Jacob Davis,* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...

CIS Compliance Best Practices and Advice

A simple guide to CIS compliance for enterprise security teams CIS compliance is a critical benchmark for organizations aiming to enhance their cybersecurity posture and protect against prevalent cyber threats. Businesses must adhere to CIS ...

Strengthening Cyber Resilience: A Milestone Partnership

As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in integrated digital solutions and part of the esteemed Zain Group. This collaboration signifies a significant step forward in our shared mission to ...