Application Security News and Articles


‘YoroTrooper’ Espionage Group Linked to Kazakhstan

Cisco links the espionage-focused ‘YoroTrooper’ threat actor to Kazakhstan. The post ‘YoroTrooper’ Espionage Group Linked to Kazakhstan appeared first on SecurityWeek.

Apple Ships Major iOS, macOS Security Updates

Apple patches dozens of serious security flaws in its macOS and iOS platforms, warning that hackers could launch code execution exploits. The post Apple Ships Major iOS, macOS Security Updates appeared first on SecurityWeek.

How Criminals Steal Passcodes and Threaten Your Financial Security

Someone tells you their iPhone is compromised, and money is stolen from their financial applications. You probably expect them to say they were hacked. Unfortunately, a wave of people are reporting instances where their iPhone is physically ...

Firefox, Chrome Updates Patch High-Severity Vulnerabilities

Firefox and Chrome updates released this week resolve multiple high-severity memory safety vulnerabilities. The post Firefox, Chrome Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

DEF CON 31 – Nils Amiet’s, Marco Macchetti’s ‘Polynonce – An ECDSA Attack and Polynomial Dance ‘

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Cisco IOS XE CVE-2023-20198 and CVE-2023-20273: WebUI Internals, Patch Diffs, and Theory Crafting

Introduction There has been a lot of news around the recent Cisco IOS XE vulnerabilities CVE-2023-20198 and CVE-2023-2073. Information about this vulnerability was first published by Cisco on October 16th, […] The post Cisco IOS XE ...

Highlights from our SEC Cyber Rules Webinar 

Our recent roundtable webinar, titled “Boardroom Insights: Unveiling C-Suite Perspectives on SEC Cyber Rules Impact,” brought together industry leaders to discuss the implications of the Securities and Exchange Commission’s (SEC) Read ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #264 – The Ketchup Effect

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #264 – The Ketchup Effect

via the respected Software Engineering expertise of Mikkel Noe-Nygaard & the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé Permalink The post Comic Agilé – Mikkel Noe-Nygaard, ...

How to Handle Secrets in Helm

Learn step-by-step techniques and best practices to handle secrets in Helm charts safely and effectively. Level up your Helm deployments today! The post How to Handle Secrets in Helm appeared first on Security Boulevard.

Mandiant Intelligence Chief Raises Alarm Over China’s ‘Volt Typhoon’ Hackers in US Critical Infrastructure

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in a series of eyebrow-raising attacks against targets in Guam and the United ...

Hackers Earn $400k on First Day at Pwn2Own Toronto 2023

NAS devices, printers, IP cameras, speakers, and mobile phones were hacked on the first day at Pwn2Own Toronto 2023. The post Hackers Earn $400k on First Day at Pwn2Own Toronto 2023 appeared first on SecurityWeek.

Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day

Russian APT Winter Vivern exploits a zero-day in the Roundcube webmail server in attacks targeting European governments. The post Russian Hackers Caught Exploiting Roundcube Webmail Zero-Day appeared first on SecurityWeek.

Bitdefender Offensive Services incorporates penetration testing and red team simulated attacks

Bitdefender announced Bitdefender Offensive Services, a new offering designed to proactively assess, identify, and remediate security gaps in an organization’s environment (on premises, cloud, hybrid) through penetration testing and red team ...

Salt Security: OAuth Implementation Flaw Could Lead to Account Takeover

Security flaws in the implementation of the OAuth authentication standard left hundreds of millions of users to at least three popular online sites exposed to possible account takeover by bad actors, according to researchers at Salt Security. The ...

Malwarebytes Identity Theft Protection defends users against online threats

Malwarebytes launched a new consumer solution, Identity Theft Protection. The new service helps individuals secure their digital identities and defend against identity and online threats. Malwarebytes Identity Theft Protection includes real-time ...

DEF CON 31 – Sam Quinn’s and Jesse Chick’s ‘Power Corrupts – Corrupt It Back! Hacking Power Management in Data Centers’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Why We’re Stuck With Passwords

Passkeys are the future, but the future is definitely not evenly distributed yet. We're all stuck with passwords until a lot more companies offer passkeys. The post Why We’re Stuck With Passwords appeared first on Security Boulevard.

The Differences Between DNS Protection and Protective DNS

DNS Protection, Protective DNS and DNS Security … What’s the Difference? In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. Two terms that often surface in discussions about online safety are DNS ...

Top 5 Fears That Keep IT Professionals Up at Night

Forget witches and zombies. For IT pros, the scariest monsters lurk in the digital realm. While most people are busyRead More The post Top 5 Fears That Keep IT Professionals Up at Night appeared first on Kaseya. The post Top 5 Fears That Keep IT ...