Application Security News and Articles


Guide to mitigating credential stuffing attacks

We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the news today, many statistics revolve around the number of detected breaches. Why are credentials so sought after? How can we ...

Securing the Journey to AI with Thales Sovereign Solutions for AWS

Securing the Journey to AI with Thales Sovereign Solutions for AWS josh.pearson@t… Mon, 06/24/2024 - 22:28 Encryption David Ortega | Principle Solution Architect More About This Author > Amazon Web Services (AWS) ...

Back to the Future: What AppSec Can Learn From 30 Years of IT Security

History doesn’t repeat itself, but it often rhymes. As AppSec evolves towards a new playbook, here’s what we can learn from IT’s journey. Just over 20 years ago, Watts Humphrey declared that every business was a software business. Not ...

StealC & Vidar Malware Campaign Identified

Weekly Threat Intelligence Report Date: June 24, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Malware developers will use all sorts of techniques to obfuscate their C2 location and keep security analysts from ...

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO In the rapidly evolving landscape of artificial intelligence, ensuring robust cybersecurity measures is ...

USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords

Distinguished Paper Award Winner Authors/Presenters: Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg Many thanks to USENIX for ...

What is AI TRiSM? And Why Is It Important?

According to Gartner, who coined the term, AI TRiSM (AI Trust, Risk and Security Management) ensures an AI model’s governance, trustworthiness, fairness, reliability, robustness, efficacy, and data protection. This includes solutions and ...

Rafel RAT Used in 120 Campaigns Targeting Android Device Users

Multiple bad actors are using the Rafel RAT malware in about 120 campaigns aimed at compromising Android devices and launching a broad array of attacks that range from stealing data and deleting files to espionage and ransomware. Rafel RAT is an ...

Randall Munroe’s XKCD ‘Electric VS Gas’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Electric VS Gas’ appeared first on Security Boulevard.

Passkeys: The Future of Passwordless Authentication

Say goodbye to passwords! Passkeys are the next generation of authentication, offering enhanced security and convenience. Learn how passkeys work, their benefits over passwords, and why they are the future of secure online access. The post ...

Millions and Millions of Fraud Domains: China attacks Illegal Gambling and Telecom Fraud

Last week I was reviewing a publication by the United Nation Office on Drugs and Crime published in January 2024, titled "Casinos, Money Laundering, Underground Banking, and Transnational Organized Crime in East and Southeast Asia: A Hidden and ...

USENIX Security ’23 – No More Reviewer #2: Subverting Automatic Paper-Reviewer Assignment Using Adversarial Learning

Authors/Presenters:Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...

How to renew SSL certificates & how to automate the process

SSL/TLS certificates secure data exchange between servers and browsers, essential for online transactions. Periodic renewal is necessary to avoid service disruptions; automation is recommended. The post How to renew SSL certificates & how to ...

PowerDMARC is Now Available on the AWS Marketplace

Reading Time: 2 min PowerDMARC is now available for purchase on AWS Marketplace. View PowerDMARC’s AWS Marketplace listing to explore amazing benefits! The post PowerDMARC is Now Available on the AWS Marketplace appeared first on Security ...

Provenir’s AI-powered risk decisioning platform increases fraud detection

As the financial services world becomes increasingly digitized and consumer demands evolve, fraudsters and their methods are becoming more sophisticated. Provenir is helping organizations fight back by detecting these emerging threats via ...

CMMC Tools for Compliance + Assessment

Achieving CMMC compliance can feel like a daunting task, but there are tools available to help expedite the process, saving time and money. The tools explored here help address the 110 security controls outlined in NIST SP 800-171, which is the ...

Open-source Rafel RAT steals info, locks Android devices, asks for ransom

The open-source Rafel RAT is being leveraged by multiple threat actors to compromise Android devices and, in some cases, to lock them, encrypt their contents, and demand money to restore the device to its original state. Check Point researchers ...

Real-time Ubuntu 24.04 LTS is Available

Canonical, the company behind Ubuntu, released real-time Ubuntu 24.04 LTS on May 30, 2024. This latest offering from Canonical promises to revolutionize real-time computing by delivering an enhanced, low-latency, and deterministic operating ...

Enzoic appoints Kristen Ranta Haikal Wilson as CEO

Enzoic announces Kristen Ranta Haikal Wilson as its new CEO. With an exceptional track record of over 25 years in software and technology, Wilson assumes the role from Michael Greene, who remains involved with the company in an advisory capacity ...

Intrusion Detection in Linux: Protecting Your System from Threats

Safeguarding your Linux environment from potential threats is more critical than ever. Whether you’re managing a small server or an extensive network, having hands-on knowledge of intrusion detection systems (IDS) is essential. IDS tools play a ...