Application Security News and Articles


Milesight Industrial Router Vulnerability Possibly Exploited in Attacks

A vulnerability affecting Milesight industrial routers, tracked as CVE-2023-4326, may have been exploited in attacks.  The post Milesight Industrial Router Vulnerability Possibly Exploited in Attacks appeared first on SecurityWeek.

Coin Flips Are Biased

Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study we collected 350,757 coin flips to test the counterintuitive prediction from a ...

Spyware Caught Masquerading as Israeli Rocket Alert Applications

A threat actor targets Israelis with spyware masquerading as an Android application for receiving rocket alerts. The post Spyware Caught Masquerading as Israeli Rocket Alert Applications appeared first on SecurityWeek.

EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits

Environmental Protection Agency (EPA) withdraws recent water sector cybersecurity rules due to lawsuits by states and water associations. The post EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits appeared first on SecurityWeek.

Security Audit | What Are the Common Characteristics of Recent Web3 Attacks, and How Can Projects…

Recently, there have been numerous security attack incidents, and these incidents have had a significant impact on project teams. One of…Continue reading on Medium »

DIY attack surface management: Simple, cost-effective and actionable perimeter insights

Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being decommissioned, and ongoing migrations to cloud providers. Assets can be created ...

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds ...

Safeguarding Your Business From Social Media Risks

Social media is the avenue to foster connections, nurture relationships, and amplify your brand’s voice across a global digital stage. Yet, like any powerful digital tool, it carries its risks. Don’t mistake this blog for a call to retreat ...

CISOs and board members are finding a common language

86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to ...

Educating the Next Cybersecurity Generation with Tib3rius

In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation. What fuels his ...

How organizations can combat rising cloud costs with FinOps

When it comes to the cloud, many organizations prioritize speed over spend. In fact, spending on public cloud services is forecasted to grow 21.7% to a total of $597.3 billion in 2023, according to Gartner. How can organizations spend more ...

Inadequate IoT protection can be a costly mistake

97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an ...

Keeping control in complex regulatory environments

Modern compliance programs represent a strategic shift in how companies approach regulatory and ethical obligations. They are designed to not only mitigate risks and avoid legal repercussions but also to enhance an organization’s ...

OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide

Have you ever wondered about the hidden chinks in the armor of your operational technology systems? In the interconnected web of technology, where the digital landscape extends its reach into every corner of our lives, safeguarding data and ...

DEF CON 31 – Marcelo Salvati’s (@byt3b133d3r) ‘SpamChannel – Spoofing Emails From 2M+ Domains & Virtually Becoming Satan’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Qatari Diar Eliminates IT Visibility Gaps to Deliver Transformative Real Estate with LogRhythm SIEM

Qatari Diar was established in 2005 by the Qatar Investment Authority, the sovereign wealth fund of the State of Qatar. Today, it is one of the world’s most trusted and respected real estate companies recognized for its commitment to ...

Where Next for States on All Things IT and Security?

The 2023 NASCIO Annual Conference wrapped up this past week in Minneapolis. Here's a quick roundup of what happened and what’s next for state IT and cybersecurity. The post Where Next for States on All Things IT and Security? appeared first on ...

Week in review: Patched curl and libcurl vulnerability, 15 free M365 security training modules

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning military veterans into cybersecurity experts In this Help Net Security interview, James Murphy, the Director of the TechVets Programme ...

Unlock Threat Hunting with MITRE ATT&CK: A 2023 Guide You Can’t Miss

Introduction In today’s rapidly evolving cyber landscape, proactive threat hunting is no longer a luxury—it’s a necessity. Gone are the days when traditional security measures could fully protect your network. Now, you need to actively seek ...

DEF CON 31 – Tamas Jos ‘Spooky Authentication At A Distance’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...