Application Security News and Articles


Complex Technology Stack Supports Sprawling Chinese Crime Operation

A cybercrime group called Vigorish Viper runs a complex suite of technologies that support the sprawling operations of a Chinese crime syndicate that has its reach into illegal online sports gambling and Europe's most popular soccer teams. The ...

USENIX Security ’23 – High Recovery With Fewer Injections: Practical Binary Volumetric Injection Attacks Against Dynamic Searchable Encryption

Authors/Presenters:Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

ShapeUp at Flare: A Game-Changer for Project Management

By Benoit Doyon, Software Development Team Lead I first encountered ShapeUp during one of my initial interviews for a position at Flare. My soon-to-be manager mentioned, “We’re using a methodology that works well for us, but you might not ...

Daniel Stori’s ‘Blue Screen of Death’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s ‘Blue Screen of Death’ appeared first on Security Boulevard.

Spooky Action from a Distance

The first question that popped into my mind when I became aware of the global IT chaos that started this Friday and the corresponding causes that were articulated was, “How do two independent objects cause each other to react so violently that ...

How to Set Up SonarQube on AWS Cloud in Minutes with AWS CDK

AWS CDK serving Sonarqube on AWS EC2 instance😎Continue reading on AWS in Plain English »

CodeSecDays 2024: A Deep Dive in Software Supply Chain Security

Explore key insights from CodeSecDays 2024 on software supply chain security. Learn about AI in DevSecOps, SLSA frameworks, developer-security collaboration, and secrets management. Discover strategies for a more secure digital future. The post ...

Scammers Rush In to Exploit CrowdStrike Chaos

Scammers are rushing into exploit the chaos created when an software update by CrowdStrike went awry, knocking out 8.5 million Windows devices and creating the opportunity for bad actors to run phishing and other malicious campaigns. The post ...

USENIX Security ’23 – Automated Analysis Of Protocols That Use Authenticated Encryption: How Subtle AEAD Differences Can Impact Protocol Security

Distinguished Paper Award Winner Authors/Presenters:Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...

How to Prepare Your Workforce for the Deepfake Era

Of all of the AI-powered weapons, the one that your employees may be the least equipped to resist is deepfake technology.  The post How to Prepare Your Workforce for the Deepfake Era appeared first on Security Boulevard.

Introducing the API Threat Landscape, a new resource for API security researchers

Since 2022, Escape's security research team has been tracking API-related data breaches. We’ve decided to make our database public, providing detailed insights into primary attack vectors, threat actors, tools, and techniques. The database is ...

Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity

A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs. The post Beyond Your Mess for Less: How Managed Services can Provide Sustainable ...

CISA Alert Calls Out Operating System Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the Federal Bureau of Investigations (FBI) has jointly issued a Secure by Design Alert in response to threat actor campaigns that exploit operating system (OS) ...

Why SSL certificates expire: exploring the benefits of shorter validity periods

SSL certificates expire to enhance security, comply with evolving regulations, and encourage timely updates. Shorter validity periods, soon to be 90 days, improve cybersecurity by ensuring frequent renewals, minimizing risks associated with ...

How to Select a Qualified SOC 2 Auditor

Obtaining a SOC 2 (Service Organization Control 2) certification is crucial in ensuring your data’s security and privacy. SOC 2 compliance demonstrates that your organization adheres to high standards for managing customer data based on five ...

Heeler Security raises $8.5 million to boost application security

Heeler Security announced the successful closing of an $8.5 million Seed Series funding round, led by Norwest Venture Partners with significant participation from Storm Ventures. “Application security requires a new approach that focuses on ...

Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update

By now, most people are aware of – or have been personally affected by – the largest IT outage the world have ever witnessed, courtesy of a defective update for Crowdstrike Falcon Sensors that threw Windows hosts into a ...

AI Security: How Hard Is It to Develop Secure AI?

This blog is based on our conversation with Rob van der Veer, Senior Principal Expert at the Software Improvement Group. It explores the complex challenges of developing secure AI systems and the critical role of governance and role segregation ...

The Human Adaptability Gap and How to Close It

The “adaptability gap”—the widening difference between the rapid pace of technological progress and the slower rate of human, or employee adaptation. The post The Human Adaptability Gap and How to Close It appeared first on Security Boulevard.

Cross-industry standards for data provenance in AI

In this Help Net Security interview, Saira Jesani, Executive Director of the Data & Trust Alliance, discusses the role of data provenance in AI trustworthiness and its impact on AI models’ performance and reliability. Jesani highlights the ...