Application Security News and Articles


DEF CON 32 – Process Injection Attacks With ROP

Authors/Presenters: Bramwell Brizendine, Shiva Shashank Kusuma Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

Connecting, Collaborating, and Celebrating: Our Global Team Seminar in the South of France

Last September, GitGuardian brought together its 150 Guardians from around the world for a three-day seminar on the beautiful Giens Peninsula in the south of France. The post Connecting, Collaborating, and Celebrating: Our Global Team Seminar in ...

Advanced Strategies for SAST Scanning in CI/CD Pipelines in the Age of AI

Optimising SAST scanning in CI/CD pipelines for greater security, agility, and developer productivityContinue reading on Medium »

Week in review: Microsoft patches actively exploited 0-days, Amazon and HSBC employee data leaked

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) November 2024 Patch Tuesday is here, and Microsoft has dropped ...

DEF CON 32 – Sudos And Sudon’ts: Peering Inside Sudo For Windows

Authors/Presenters: Michael Torres Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Cyber Crisis Management Plan: Shield for Brand Reputation

Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...

The SEC Cybersecurity Rule: Awareness Rises, Compliance Lags

Explore how the SEC Cybersecurity Rule has raised boardroom awareness, but why achieving true resilience and transparency remains a critical challenge. The post The SEC Cybersecurity Rule: Awareness Rises, Compliance Lags appeared first on ...

The Value of Database Subsetting

Subsetting is the unsung hero of modern test data workflows. Today, we’re excited to spotlight several recent innovations in our subsetter that are making this powerful solution even more impactful. The post The Value of Database Subsetting ...

How to Create Realistic Test Data for Amazon Redshift

Learn how to create realistic test data for Amazon Redshift with Tonic! Safely generate realistic test data with our one-stop shop for synthetic data. The post How to Create Realistic Test Data for Amazon Redshift appeared first on Security ...

What is Data Subsetting? The Art and Science of Only Using the Data You Need

There’s one ring to rule them all when it comes to smaller and more efficient databases—and it’s called subsetting with Tonic. Read on to learn more. The post What is Data Subsetting? The Art and Science of Only Using the Data You Need ...

Build vs. Buy? Test Data Doesn’t Have to be Another In-House Project

After leading the deployment of Tonic at two companies and attempting to build similar solutions in-house, a DevOps and Engineering leader keeps coming back to Tonic for sourcing quality test data with a rapid time to value. The post Build vs. ...

How To Create Realistic Test Data For MySQL

We take a look at how to create realistic test data for MySQL! With Tonic's generators, your test data will act and look exactly like production data. The post How To Create Realistic Test Data For MySQL appeared first on Security Boulevard.

Life in the Swimlane with Connor Mansfield, Senior SDR

The post Life in the Swimlane with Connor Mansfield, Senior SDR appeared first on AI-Enhanced Security Automation. The post Life in the Swimlane with Connor Mansfield, Senior SDR appeared first on Security Boulevard.

DEF CON 32 – Manipulating Shim And Office For Code Injection

Authors/Presenters: Ron Ben-Yizhak, David Shandalov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Executive Perspectives, Episode 3, Bobby Mehta

In the latest installment of our Executive Perspectives interview series, Axio CEO Scott Kannry  sat down with Bobby Mehta, the former President & CEO of TransUnion and a sitting board Read More The post Executive Perspectives, Episode 3, ...

Daniel Stori’s Turnoff.US: ‘I Love Windows Powershell’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘I Love Windows Powershell’ appeared first on Security Boulevard.

Metrics That Matter: How Security Professionals Can Show Value

Build a metrics program tailored to your organization’s strategic goals This article was originally published in Security Magazine. Think back to your early days in the security industry. Perhaps, like many others, you spent years in law ...

Clever PayPal-based Attack

Do not call that number! This attack is brilliant. It uses a legitimate PayPal email message about a bogus payment to trick you into phoning a bogus PayPal phone number. I have received several of them this week with various names for the company ...

Comprehensive Risk Analysis: Inversion6 Transforms Client Assessments

Understand how AppOmni’s comprehensive SSPM platform helped Inversion6 face their SaaS security challenges and gained enhanced security insights. The post Comprehensive Risk Analysis: Inversion6 Transforms Client Assessments appeared first on ...

Ten Lessons Learned from The Mother of All Breaches Data Leak

What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data protection, and more. It’s almost been a year since the “Mother of All Breaches” (MOAB), widely known as one of the largest and most impactful data ...