Application Security News and Articles


Fraud Detection Firm Spec Raises $15 Million

Silicon Valley fraud detection startup attracts $15 million in new financing from SignalFire, Legion Capital and Rally Ventures. The post Fraud Detection Firm Spec Raises $15 Million appeared first on SecurityWeek.

NetSPI boosts phishing resilience with enhanced social engineering penetration testing

NetSPI unveiled enhancements to its social engineering penetration testing solutions to help organizations build resilience to modern-day phishing attacks. The updates bring a customized, contextual approach to social engineering testing and go ...

How Digital Forensics Can Investigate the Dark Web

If your personal information is stolen in a data breach, it can find its way to the dark web to be sold, traded and exploited. The post How Digital Forensics Can Investigate the Dark Web appeared first on Security Boulevard.

Iranian Hackers Lurked for 8 Months in Government Network

Iran-linked hacking group Crambus spent eight months inside a compromised network of a Middle Eastern government, Broadcom’s Symantec cybersecurity unit reports. The post Iranian Hackers Lurked for 8 Months in Government Network appeared first ...

How to Make Your Threat-Hunting Program More Effective

As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program. The post How to Make Your Threat-Hunting Program More Effective appeared first on Security Boulevard.

ABS Consulting and Dragos boost OT cybersecurity partnership for federal and commercial sectors

ABS Consulting and Dragos have expanded their strategic partnership to provide operational technology (OT) cybersecurity solutions, services and training to federal and commercial organizations. This strategic partnership will build on the ...

AI and US Election Rules

If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question being taken up by the Federal Election Commission this month, and public input is needed to curtail the potential for AI to take US campaigns ...

Researchers uncover DarkGate malware’s Vietnamese connection

WithSecure researchers have tracked attacks using DarkGate malware to an active cluster of cybercriminals operating out of Vietnam. DarkGate is a remote access trojan (RAT) that has been used in attacks since at least 2018 and is currently ...

North Korean hackers are targeting software developers and impersonating IT workers

State-sponsored North Korean hackers have significantly intensified their focus on the IT sector in recent years, by infiltrating firms developing software and companies lookind for IT workers. North Korean hackers targeting developers Microsoft ...

Ghost Accounts, Entitlement Creep and Unwanted Guests

Ghost Accounts, Entitlement Creep, and Unwanted Guests: How Access Governance Can Protect Your SystemsIf your organization uses an ERP or other digital business applications to store and manage data, you could be at risk from some pretty spooky ...

HTTP/2 Protection in ADS R90F03

Function Description For HTTPS application layer protection, ADS establishes a TLS connection with a client in replace of the server, and then authenticates the client through the application-layer protocol HTTP. If the client properly responds ...

Understanding The FTC Safeguards Rule

The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data  The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ...

New infosec products of the week: October 20, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Arcitecta, AuditBoard, BackBox, Prevalent, and Thales. Thales introduces SafeNet IDPrime FIDO Bio Smart Card The SafeNet IDPrime FIDO Bio Smart Card ...

Legacy authentication leads to growing consumer frustration

Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually without any form of additional authentication was the most commonly used ...

How to Choose the Best Website Penetration Testing Tool?

Secure your assets effectively by choosing the right website penetration testing tools. Gain insights for optimal selection The post How to Choose the Best Website Penetration Testing Tool? appeared first on Indusface. The post How to Choose the ...

The real impact of the cybersecurity poverty line on small organizations

The financial constraints many smaller organizations face often cast shadows on their ability to fortify defenses. In this Help Net Security interview, Brent Deterding, CISO at Afni, delves into the realities and myths surrounding the ...

GenAI investments surge, anticipated to hit $143 billion by 2027

Enterprises will invest nearly $16 billion worldwide on GenAI solutions in 2023, according to IDC. This spending, which includes GenAI software and related infrastructure hardware and IT/business services, is expected to reach $143 billion in ...

The double-edged sword of heightened regulation for financial services

Financial services organizations are enticing targets for cybercriminals due to their significant wealth holdings, presenting abundant opportunities for monetary gain through extortion, theft, and fraud, according to Trustwave. In addition to the ...