Application Security News and Articles


Addressing Executive & Social Media Impersonation: Protecting Leaders That Lack an Online Presence

Recently, a number of brands have approached our threat response team about fake social media accounts impersonating executives at their companies. Scammers impersonating an executive on… The post Addressing Executive & Social Media ...

#iLeakage: All Apple CPUs Vulnerable — No Patch in Sight

Son of Spectre: No fix for iOS, “unstable” workaround for macOS. The post #iLeakage: All Apple CPUs Vulnerable — No Patch in Sight appeared first on Security Boulevard.

iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones

New iLeakage side-channel speculative execution attack exploits Safari to steal sensitive information from Macs and iPhones. The post iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones appeared first on SecurityWeek.

CISA and HHS Pull Together Cybersecurity Toolkit for Healthcare Sector

Federal government agencies are rolling out a set of resources designed to help healthcare organizations under siege from a growing number of ransomware and other cyber-attacks to better protect themselves against threat groups looking to extort ...

At-Bay Stance MDR improves cyber resilience for SMBs

At-Bay launched At-Bay Stance Managed Detection and Response (At-Bay Stance MDR), a new MDR solution designed to help emerging and mid-sized businesses advance their security defenses and threat preparedness in light of rising cyber crime rates. ...

DEF CON 31 – Panel: Harley Geiger, Michaela Lee, Suzanne Schwartz, Lindsey Forson, Lauren Zablerek ‘Policy – US Cyber Policy 101’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

[TryHackMe] Mother’s Secret

IntroductionContinue reading on Medium »

Passwordless Authentication in Air-Gapped Networks: A Q&A With Alejandro Lopresti, IDEMIA

There’s a common assumption that in air-gapped networks, the air gap (the separation of the... The post Passwordless Authentication in Air-Gapped Networks: A Q&A With Alejandro Lopresti, IDEMIA appeared first on Axiad. The post Passwordless ...

Cado Security launches Cloud Incident Readiness Dashboard for proactive response

Cado Security has unveiled Cado’s Incident Readiness Dashboard. This new dashboard provides the ability to proactively run readiness checks, see readiness trends over time, and identify issues that could prevent the organization from rapidly ...

How Cybersecurity Can Be a Catalyst for Technology Innovation

Innovation is a primary engine of growth for modern business. It helps organizations stay relevant at a time of intense technological change. It can also help them to become more efficient. And it can even encourage the brightest and best talent ...

Darktrace Extends AI Reach to Secure AWS Clouds

Darktrace's cloud security platform leverages AI to detect known trusted deployment patterns and automatically apply missing controls. The post Darktrace Extends AI Reach to Secure AWS Clouds appeared first on Security Boulevard.

The Importance of Real-Time Threat Detection at Scale: Unveiling the Hidden Attack Surface

Real-time threat detection is crucial for organizations to effectively maintain their security posture and gain enhanced visibility to defend against ever-evolving cyber threats. However, many organizations face challenges implementing and ...

Google Announces Bug Bounty Program and Other Initiatives to Secure AI

Google announces a bug bounty program and other initiatives for increasing the safety and security of AI. The post Google Announces Bug Bounty Program and Other Initiatives to Secure AI appeared first on SecurityWeek.

Darktrace/Cloud solution based on self-learning AI provides cyber resilience for cloud environments

Darktrace unveiled a new Darktrace/Cloud solution based on its self-learning AI. The new solution provides comprehensive visibility of cloud architectures, real-time cloud-native threat detection and response, and prioritized recommendations and ...

Japanese Watchmaking Giant Seiko Confirms Personal Data Stolen in Ransomware Attack

Japanese watchmaking giant Seiko has confirmed that personal information was stolen in a recent ransomware attack. The post Japanese Watchmaking Giant Seiko Confirms Personal Data Stolen in Ransomware Attack appeared first on SecurityWeek.

Weapons Systems Provide Valuable Lessons for ICS/OT Security

Cybersecurity techniques and penetration testing used in the field of weapons systems can provide valuable lessons for ICS/OT security. The post Weapons Systems Provide Valuable Lessons for ICS/OT Security appeared first on SecurityWeek.

How Machine Identity Management Bolsters IoT Security

In recent years, the Internet of Things (IoT) has transformed the way we interact with technology, embedding connected devices into every aspect of our lives. From smart homes and wearables to industrial automation and smart cities, IoT has ...

Progress Flowmon ADS 12.2 AI offers advanced security event monitoring

Progress has unveiled the latest release of its network anomaly detection system, Progress Flowmon ADS. Flowmon ADS 12.2 harnesses the power of artificial intelligence (AI) to provide an advanced and holistic view of detected security events, ...

Physical Security Operations: The Costs of not Being Enterprise-Ready

At most large organizations today, physical security is expected to comply with the same standards and practices as their IT counterparts. This means they have to ensure devices are fully operational and compliant. But while physical security ...

Identity Heroes Webinar Series Launches

MEDIA ADVISORY First event on Unlocking the Future of Identity will explore decentralized identity, emerging standards, and the rise of passkeys  BOULDER, Colo., Oct. 26, 2023 — Strata Identity, the Identity Orchestration company, today ...