Application Security News and Articles


Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

The StripedFly malware has APT-like capabilities, but remained unnoticed for five years, posing as a cryptocurrency miner. The post Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools ...

Unlocking API Security Excellence: Wallarm at OWASP Global AppSec DC 2023

If you're involved in securing APIs, applications and web applications, or looking to learn about these, then the OWASP Global AppSec DC Conference next week is a must-attend event. Wallarm, the experts in API and application security, will be ...

F5 Warns of Critical Remote Code Execution Vulnerability in BIG-IP

A critical-severity vulnerability in F5 BIG-IP CVE-2023-46747 allows unauthenticated attackers to execute code remotely. The post F5 Warns of Critical Remote Code Execution Vulnerability in BIG-IP appeared first on SecurityWeek.

Staying Ahead of Social Engineering Threats

With social engineering exploits on the rise, now is a good time to stay ahead of threats and attackers’ tricks, keep your personal and sensitive data safe and stop unlawful entry into your organization. Bad actors are always looking for the ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/27

Insight #1 Virtual CISO (vCISO), CISO on Demand: These services are aka “Please help me short-term with security!” All of these outsourced security practitioner services have one thing in common: a small business knows they need help, but ...

Understanding Advanced Persistent Threats

What are Advanced Persistent Threats(APTs)?  Advanced persistent threats (APTs) are a type of cyber attack that poses a serious threat to organizations and individuals alike. In this article, we will delve into the world of APTs, exploring what ...

IT, Security Leaders Play Catch-Up With Generative AI Threats

There's a significant disparity between organizations' concerns about generative AI risks and their effectiveness in addressing them. The post IT, Security Leaders Play Catch-Up With Generative AI Threats appeared first on Security Boulevard.

Adtran tackles GPS vulnerabilities with Satellite Time and Location technology

Adtran launched new synchronization solutions featuring Satellite Time and Location (STL) technology to address the growing vulnerabilities of GPS and other GNSS systems to jamming and spoofing attacks. Alongside GNSS-based timing, the OSA 5405-S ...

TeamViewer Tensor enhancements improve security and productivity

TeamViewer announced a major update of its enterprise connectivity solution TeamViewer Tensor, supporting IT departments in maintaining business-critical equipment. With leading compatibility, security and performance, TeamViewer Tensor offers a ...

UN Chief Appoints 39-Member Panel to Advise on International Governance of Artificial Intelligence

U.N. Secretary-General António Guterres assembled a global advisory panel to report on international governance of artificial intelligence and its risks, challenges and key opportunities. The post UN Chief Appoints 39-Member Panel to Advise on ...

Apple news: iLeakage attack, MAC address leakage bug

On Wednesday, Apple released security updates for all supported branches of iOS and iPadOS, macOS, tvOS, watchOS and Safari. This time around, the updates did not garner as much attention as when they deliver a zero-day fix, though it has to be ...

What is Traffic Shaping ?

Unraveling the Enigma of Traffic Modulation Within the realm of digital information, data traffic parallels a high-speed freeway, ferrying packets of details to-and-fro. So what transpires when there's an excessive influx, leading to an ...

Complete Guide to Asset Inventory Management in OT/ICS

In the past few years, it has been seen that industrial control systems (ICSs) are also vulnerable to cybersecurity incidents. As a result, organizations have become increasingly aware of their vulnerabilities, which has led to the deployment of ...

You know what? Everyone gets a virus now and then.

I will never forget the first time I caught a digital bug. I was sitting at my desk at my company’s open-concept office in Chicago when I got an email from HR. It read:  Company Policy Reminder: Please Review Following an incident in the ...

What is Advanced Persistent Threat? Uncover the Hidden Dangers!

Introduction Understanding what Advanced Persistent Threat (APT) is can be a game-changer in today’s cybersecurity landscape. APT is a prolonged, aimed attack on a specific target. It does this with the intention to compromise their system and ...

The Critical Need to Defend Against Unauthorized Apps

Safeguarding Security and Integrity: In today's digital landscape, mobile applications have become integral to our daily lives, offering convenience, entertainment, and essential services. However, with the rise of mobile app usage, there's also ...

Raven: Open-source CI/CD pipeline security scanner

Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities woven throughout the pipeline that, when viewed ...

New infosec products of the week: October 27, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Darktrace, Data Theorem, Jumio, Malwarebytes, Progress, and Wazuh. Progress Flowmon ADS 12.2 AI offers advanced security event monitoring Flowmon ADS ...

IoT security threats highlight the need for zero trust principles

The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security, as ...

SMBs at risk as AI misconceptions lead to overconfidence

Despite advancements in IT security measures, SMBs remain firmly in the crosshairs of cybercriminals, according to Devolutions. Ransomware payments and IoT malware incidents soar Spikes in incidents such as ransomware payments and IoT malware ...