Application Security News and Articles


Incident Workflow to streamline ITGC testing

Enhanced Incident Workflow streamlines ITGC testingITGCs are required by the Sarbanes Oxley Act of 2002 (SOX) to ensure the integrity of financial reports. While SOX is focused on the propriety of your financial and accounting practices, SOX ITGC ...

How Diversity and Inclusion Initiatives Can Reduce Cyber Risk

In the aftermath of the national reckoning on racial justice ignited by the tragic events involving George Floyd, it became evident that despite good intentions, the cybersecurity sector had not tackled the field’s predominantly white and male ...

How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A passkey is a digital credential that can only be used by the ...

Israeli-Palestinian Conflict: Multifaceted Alliances and Fierce Cyberspace Battle

Background On October 7th, accompanied by the launch of thousands of rockets, the Palestinian Islamic Resistance Movement (Hamas) declared a military operation against Israel. As real-world conflict escalated, hacktivist organizations from ...

Navigating OT/IT convergence and securing ICS environments

Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher ...

Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale

In milestone episode 300, Jayson E. Street (a renowned hacker, helper, and human who has successfully robbed banks, hotels, government facilities, and Biochemical companies on five continents) joins us to share what he’s been up to recently and ...

Scaling rapidly? Your application security strategies need to keep up

Modern application security strategies must support and enable modern software development, even as it rapidly scales, according to Mend.io. Just 52% of companies can effectively remediate critical vulnerabilities and only 41% are confident they ...

Only a fraction of risk leaders are prepared for GenAI threats

While 93% of companies recognize the risks associated with using generative AI inside the enterprise, only 9% say they’re prepared to manage the threat, according to Riskonnect. The research reveals a profound AI risk management gap: To date, ...

Cyberattacks put healthcare organizations on high alert

Healthcare organizations have become prime targets for cybercriminals due to the immense value of their data, including patient records, sensitive medical information, and financial data. The importance of protecting this invaluable information, ...

Exposing North Korea’s IT Worker’s Eden Programming Solutions WMD-Funding IT Services and Solutions Franchise – An Overview

Jessus. This just in and I think I "did it" and I might even apply fore the Rewards for Justice program second time in a row this time believe it or on North Korea's WMD program in terms of tracking down North Korean IT workers that appear to ...

DEF CON 31 – Dr. Sebastian Köhler’s, Dr. Richard Baker’s ‘Car Hacking Village – Exploiting Wireless Side Channels In EV Charging’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Week in review: Cybersecurity cheat sheets, widely exploited Cisco zero-day, KeePass-themed malvertising

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: North Korean hackers are targeting software developers and impersonating IT workers State-sponsored North Korean hackers have significantly ...

DEF CON 31 – Corynne McSherry’s, India McKinney’s, Daly Barnett’s, Kate Bertash’s ‘Reproductive Justice In The Age of Digital Surveillance’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Behind the Breach: Cross-tenant Impersonation in Okta

In recent investigations, the Obsidian Threat Research team has observed multiple instances of cross-tenant impersonation used to establish persistence and escalate user privileges within Okta environments. This technique poses a significant risk ...

Okta Support System Hacked, Sensitive Customer Data Stolen

Okta warns that hackers broke into its support case management system and stole sensitive data that can be used to impersonate valid users. The post Okta Support System Hacked, Sensitive Customer Data Stolen appeared first on SecurityWeek.

Palo Alto Networks Extends Scope of CNAPP Reach

Via a Darwin update, Palo Alto Networks this week added six capabilities to its cloud-native application protection platform (CNAPP). The post Palo Alto Networks Extends Scope of CNAPP Reach appeared first on Security Boulevard.

EU Authorities Deal Blow to RagnarLocker Ransomware Operations

Law enforcement agencies throughout Europe and the United States took a big swing at the notorious RagnaLocker ransomware group, arresting a malware developer, seizing parts of its infrastructure, and shutting down negotiations and leak sites on ...

DEF CON 31 – Wesley McGrew’s ‘Retro Exploitation – Vintage Computing As A Vuln Research Playground’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

On Detection: Tactical to Functional

Part 9: Perception vs. Conception The concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly recommend checking the ...

News alert: AI-powered web scrapers from Oxylabs are breaking new ground in fraud detection

Vilnius, Lithuania, Oct. 20, 2023 — The UN Office on Drugs and Crime estimates that 5% of global GDP (£1.6 trillion) is laundered yearly, with increasing volumes of online data and the digitization of the economy making fraudsters more … ...