Application Security News and Articles


SMBs at risk as AI misconceptions lead to overconfidence

Despite advancements in IT security measures, SMBs remain firmly in the crosshairs of cybercriminals, according to Devolutions. Ransomware payments and IoT malware incidents soar Spikes in incidents such as ransomware payments and IoT malware ...

AI strengthens banking’s defense against fraud

Consumers are ready for the next wave of payment technology, including deployment of AI-driven biometrics to verify identity in digital-first account opening processes, according to Entrust. The key to future payment solutions 63% of respondents ...

AI-related security fears drive 2024 IT spending

Worldwide IT spending is projected to total $5.1 trillion in 2024, an increase of 8% from 2023, according to Gartner. 2024 set to see strong public cloud spending growth While generative AI has not yet had a material impact on IT spending, ...

Introduction to WAF Exception Policy

Exception policies are supplements or restrictions to configured basic or advanced protection policies. On the Exception Policy page, you can create, edit, delete, and duplicate exception policies. You can also create and edit exception policies ...

Navigating the Complex World of Platform Engineering

One of the most prevalent misconceptions surrounding platform engineering is the notion that the team’s ultimate success results in creating a single tool with ... The post Navigating the Complex World of Platform Engineering appeared first on ...

Successful Cyber Risk Quantification: Webinar Takeaways

The following is a webinar takeaways blog that featured David White, Axio President and Yousef Ghazi-Tabatabai, Director PwC UK. Moderation provided by Jennifer Moll, VP of Strategy, Axio Embark on Read More The post Successful Cyber Risk ...

DEF CON 31 – India McKinney’s ‘The Coming War on Encryption Part 3’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data

Mirth Connect versions prior to 4.4.1 are vulnerable to CVE-2023-43208, a bypass for an RCE vulnerability. The post Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data appeared first on SecurityWeek.

Citrix Urges Immediate Patch for Critical NetScaler Vulnerability

Due to ongoing attacks, Citrix has urged admins to immediately patch a critical sensitive information disclosure flaw affecting NetScaler ADC and NetScaler Gateway, tracked as CVE-2023-4966.   What are the details on the Citrix NetScaler ...

The State of Security for Finance: What You Need to Know

The post The State of Security for Finance: What You Need to Know appeared first on AI Enabled Security Automation. The post The State of Security for Finance: What You Need to Know appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Daylight Saving Choice’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Daylight Saving Choice’ appeared first on Security Boulevard.

What Mend.io’s AppSec Experts Say About Cybersecurity

Discover issues in the current cybersecurity landscape that have the attention of six of Mend.io’s leading experts. The post What Mend.io’s AppSec Experts Say About Cybersecurity appeared first on Mend. The post What Mend.io’s AppSec ...

Top 5 Tips for Better Kubernetes Self Service

When you've got a medium- to large-sized company, you need a platform to help your application teams ship code into production in a standardized way. This ensures that your applications are easier to maintain, scalable, secure, and ...

CVE-2023–4632: Local Privilege Escalation in Lenovo System Updater

Version: Lenovo Updater Version <= 5.08.01.0009Operating System Tested On: Windows 10 22H2 (x64)Vulnerability: Lenovo System Updater Local Privilege Escalation via Arbitrary File WriteAdvisory: ...

Drowning in Vulnerabilities: The Hidden Costs of Poor Risk Prioritization

Starting with Vulnerabilities Modern vulnerability management programs combine multiple tools in multiple layers, such as asset management, vulnerability scanners, and patch management systems, to help an organization deal with vulnerabilities in ...

Hackers Earn $350k on Second Day at Pwn2Own Toronto 2023

Smart speakers, printers, routers, NAS devices, and mobile phones were hacked on the second day at Pwn2Own Toronto 2023. The post Hackers Earn $350k on Second Day at Pwn2Own Toronto 2023 appeared first on SecurityWeek.

AI Security Firm Cranium Raises $25 Million

AI cybersecurity firm Cranium has raised $25 million in Series A funding, which brings the total investment in the company to $32 million. The post AI Security Firm Cranium Raises $25 Million appeared first on SecurityWeek.

Guarding Paradise: Strategies for Cybersecurity in Exclusive Enclaves

The allure of paradise often beckons the world’s wealthiest individuals to remote and opulent island communities. However, beneath the surface of this opulence lies a digital battleground where cybercriminals and foreign adversaries target ...

Key Learnings from “Big Game” Ransomware Campaigns

There are key steps every organization should take to leverage threat and event data across the lifecycle of a cyber incident. The post Key Learnings from “Big Game” Ransomware Campaigns appeared first on SecurityWeek.

Kansas Court System Down Nearly 2 Weeks in ‘Security Incident’ That Has Hallmarks of Ransomware

Kansas is calling a massive computer outage that’s kept most of the state’s courts offline for 2 weeks a “security incident” and experts say it's likely ransomware. The post Kansas Court System Down Nearly 2 Weeks in ‘Security ...