Application Security News and Articles


CISA Alert: Urgent Patching Required for Linux Kernel Vulnerability

Given the active exploitation of this Linux kernel vulnerability, federal agencies are strongly urged to apply patches by June 20, 2024. This vulnerability, tracked as CVE-2024-1086, carries a high-severity rating with a CVSS score of 7.8. ...

Python Developers Targeted Via Fake Crytic-Compilers Package

As per recent reports, cybersecurity experts uncovered a troubling development on the Python Package Index (PyPI) – a platform used widely by developers to find and distribute Python packages. A malicious package named ‘crytic-compilers‘ ...

It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever.

Modern chief information security officers (CISOs) are navigating tough circumstances due to complex challenges and heightened regulatory pressures. The post It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than ...

Cilium: Open-source eBPF-based networking, security, observability

Cilium is an open-source, cloud-native solution that leverages eBPF technology in the Linux kernel to provide, secure, and monitor network connectivity between workloads. What is eBPF? eBPF is a technology originating from the Linux kernel that ...

How to find Kaspersky products with runZero

The US government has banned the sale of Kaspersky products and services. Here's how to find Kaspersky products in your network. The post How to find Kaspersky products with runZero appeared first on Security Boulevard.

Pressure mounts on CISOs as SEC bares teeth with legal action

A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator that cybersecurity posture is present in a filing. This compares to ...

New infosec products of the week: June 21, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Atsign, Datadog, Metomic, NinjaOne, Verimatrix, and Veritas Technologies. Datadog App Builder helps accelerate issue remediation Datadog App Builder ...

Report Details Reemergence of Lockbit 3.0 Ransomware Syndicate

An analysis of ransomware attacks claimed to have been perpetrated by cybercriminal syndicates that was published today by NCC Group, a provider of managed security services, finds LockBit 3.0 has reemerged to claim the top spot amongst the most ...

Cyber A.I. Group Announces the Engagement of Walter L. Hughes as Chief Executive Officer

Miami, United States, 20th June 2024, CyberNewsWire The post Cyber A.I. Group Announces the Engagement of Walter L. Hughes as Chief Executive Officer appeared first on Security Boulevard.

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks. The post Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code appeared first on Security Boulevard.

Why Devs Aren’t Responsible for Non-Human Credential Hygiene

3 min read Security teams can enhance business operations by providing workload credential management as a service, freeing developers to focus on innovation. The post Why Devs Aren’t Responsible for Non-Human Credential Hygiene appeared first ...

Identity Fraud Does Not Discriminate

From banking to real estate, healthcare, ride sharing, and more, it’s increasingly clear that no... The post Identity Fraud Does Not Discriminate appeared first on Entrust Blog. The post Identity Fraud Does Not Discriminate appeared first on ...

Digital Identity: There’s a Lot at Stake

Midway through 2024, we’ve moved beyond digital transformation to become digital first. From shopping to... The post Digital Identity: There’s a Lot at Stake appeared first on Entrust Blog. The post Digital Identity: There’s a Lot at Stake ...

USENIX Security ’23 – FirmSolo: Enabling Dynamic Analysis Of Binary Linux-Based IoT Kernel Modules

Authors/Presenters:Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open ...

The Forgotten Need for Network Observability in the Rush to Migrate to the Cloud

As enterprises embrace a multi-cloud strategy, the top use case is apps siloed on different clouds which increased to 57%, up from 44% last year. So, when it comes to cloud security, it makes sense for enterprises to focus on app security right ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #294 — Enabling Flow

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped

Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears. The post EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped appeared first on Security Boulevard.

Stopping Cyber Attacks Against the Financial Sector: Four Use Cases

The financial sector is a prime target for cyber attacks. Financial organizations and their customers and clients feel the fallout of major ransomware and phishing campaigns more than ever, and there’s often more at stake. Finance needs a new ...

The Secret Ingredient to Preempt Cyberattacks: Digital Exhaust

Understanding whether a given communication steam is normal, expected, or anomalous and adversarial is an essential part of cybersecurity efforts. Many solutions rely on lists and feeds of domains to block, but this strategy isn’t efficient ...

Understanding the Dell Data Breach | Impart Security

Recently, Dell faced a significant data breach, where a threat actor exploited API vulnerabilities to steal 49 million customer records. This incident not only underscores the growing threat of API abuse but also highlights the necessity for ...