Application Security News and Articles


The must-knows about low-code/no-code platforms

The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that alter the ways we live and work. We now have the option to listen to playlists carefully curated to match our taste by ...

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every network issue doesn’t resolve to some funky DNS issue, too many network admins have banged their heads ...

Addressing cyber threats in healthcare operational technology

The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In ...

NSFOCUS AISecOps: Elevating Your Security Operations Efficacy and Mitigating Alert Fatigue

In the realm of security operations, enterprises often face challenges such as a high volume of alerts, an inability to pinpoint real threats, insufficient security knowledge, and a lack of operational staff. While the operational platforms of ...

Cyber resilience starts in the C-suite

In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21% of other senior leaders are heavily involved, according to ...

Business resilience becomes primary force behind cybersecurity investments

Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their cybersecurity investments, according to Nixu. The report reveals both encouraging progress and increasing concerns. ...

Cybersecurity Awareness Month: The Evolution of Ransomware

This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] The post Cybersecurity Awareness Month: The Evolution of Ransomware appeared first on ...

CFPB to Announce Major Open Banking Proposed Rule

Consumer Financial Protection Bureau (CFPB) to Release Major New Proposed Rule on Thursday October 19 Cequence’s contacts in Washington D.C. indicate that the Consumer Financial Protection Bureau (CFPB) will publish their major rule on ...

Finland Charges Psychotherapy Hacker With Extortion

Finland charged a hacker, accused of the theft of tens of thousands of records from psychotherapy patients, with over 21,000 counts of extortion. The post Finland Charges Psychotherapy Hacker With Extortion appeared first on SecurityWeek.

DEF CON 31 – Jonathan Birch’s ‘Second Breakfast Implicit & Mutation Based Serialization Vulns in NET’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

On Least Privilege, JIT, and Strong Authorization

I’ve been employed as a security professional for over 20 years. I cannot possibly count the number of times I have uttered the words “least privilege”. It’s like a little... The post On Least Privilege, JIT, and Strong Authorization ...

Spoofed Rocket Alert App Targets Israeli Android Users with Spyware

As violence and protests spread in the chaotic war between Israel and Hamas, evidence of the parallel battle going on in cyberspace continue to emerge. It started almost immediately after the initial bloody incursion by Hamas fighters into ...

What is an island hopping cybersecurity attack? | Cyber Bank Heists Report | Contrast Security

Cyber Bank Heists report sheds light on the evolution of island-hopping cyber threats This year’sCyber Bank Heists report by Contrast Security was eye-opening. The annual report sheds light on the cybersecurity threats facing the financial ...

Bi-Directional Sync with Microsoft Sentinel and Smart SOAR

Managed security service providers (MSSPs) and organizations that oversee multiple security teams will often have to manage multiple tenants of Microsoft Sentinel. In this situation, it’s inefficient and overwhelming to switch between instances ...

Android TV Devices: Pre-0wned Supply Chain Security Threats

Validating The Digital Supply Chain For more insights on hardware hacking, check out the webinar: Spooky Experiments – Building Your Own Security Research Lab. With the help of the Eclypsium research team (and others mentioned below), I set out ...

Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw

Google says it is still catching government-backed groups linked to China and Russia launching WinRAR exploits in targeted attacks. The post Three Months After Patch, Gov-Backed Actors Exploiting WinRAR Flaw appeared first on SecurityWeek.

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #263 – SAP Consultants

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...

8 Key Strategies For Hardening Your Identity and Access Management Security

Learn more about identity (IAM) security and discover eight strategies to harden your SaaS identities to mitigate the threat of SaaS cyber breaches. The post 8 Key Strategies For Hardening Your Identity and Access Management Security appeared ...

Digital Identity Firms Being Bolstered by Investments

Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, and the fallout from the COVID-19 ...

NIST Compliance

Firmware security is a key element of multiple important NIST documents, including SP 800-37 (the Risk Management Framework), SP 800-53 (Security and Privacy Controls), SP 800-147 (BIOS Protection Guidelines), 800-155 (BIOS Integrity Measurement) ...