Application Security News and Articles


What Are Your Current Compliance Operations Really Costing You?

There’s no question that building a strong, proactive risk and compliance program has become modern table stakes for doing business. New regulations and certifications, increased regulatory scrutiny, and the focus on cybersecurity risk ...

Insights from CISA’s Study on CDR

Author: Eric Avigdor, VP of Product Management, Votiro Malware transmitted via email has been a persistent plague to organizations for decades. Every organization has email, and sending emails with toxic payloads requires little infrastructure or ...

TuxCare adds ESU service for stability and predictability in AlmaLinux systems

TuxCare has unveiled the addition of a new Extended Security Update (ESU) service for its Enterprise Support Service line up for AlmaLinux OS. The new ESU service enhances TuxCare’s comprehensive service portfolio for AlmaLinux OS, enabling ...

Microsoft Defender Brings Automated Attack Disruption to Endpoints

Microsoft’s Defender for Endpoint can now stop ransomware and other human-operated cyberattacks by automatically isolating a compromised device to keep the bad actors from being able to move laterally through a targeted organization’s ...

HashiCorp strengthens HCP for enhanced workflow automation and lifecycle management

HashiCorp has unveiled product updates across the HashiCorp Cloud Platform (HCP). Announcements are focused on enhancements to workflow automation for developers and infrastructure and security lifecycle management for cloud platform teams. Key ...

DEF CON 31 – Jos Wetzels’, Carlo Meijer’s & Wouter Bokslag’s ‘Tetra Tour de Force Jailbreaking Digital Radios & Base Stations For Fun’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

PwC Survey: Boards of Directors Still Challenged by Cybersecurity

A survey of 645 boards of directors conducted by PwC found nearly half (49%) still viewed cybersecurity as a challenge. The post PwC Survey: Boards of Directors Still Challenged by Cybersecurity appeared first on Security Boulevard.

WithSecure announces new capabilities to help organizations manage security risks

WithSecure has continued to evolve its Elements cloud-based security platform with the addition of several new capabilities and services that can help organizations manage risks associated with cyber attacks. WithSecure Elements, which can be ...

How Insurers Can Grow Their Data-Centric Business Through Improved Cybersecurity

Data and users are what usually attract cyber-criminals to specific sectors and organizations. And the insurance industry has both in droves. While carriers play an integral role in helping their customers to transfer financial liability for ...

5 Ways to Leverage CAASM Throughout the M&A Lifecycle

Mergers and acquisitions (M&A) are pivotal moments in today’s fast-paced business environment, marking significant transitions and growth opportunities for organizations. According to research from PwC, there were 27,003 M&A ...

Edgio Application Bundles eliminate unpredictable usage-based costs

Edgio introduced Protect and Perform Applications Bundles, a solution that combines Tier-1 web performance capabilities with a full-spectrum web security suite and enterprise-level SOC support services – all in a single, comprehensive package. ...

CISO Global Listed on PCI Marketplace as Qualified Security Assessor

Global cybersecurity provider working with clients to ready them for transition to upcoming PCI 4.0 standard   Scottsdale, Ariz. October 11, 2023 – CISO Global (NASDAQ: CISO), an industry leader as a managed cybersecurity and compliance ...

Suzette Kent Joins stackArmor AI Risk Management Center of Excellence (CoE)


By: Gaurav “GP” Pal, Founder and CEO, stackArmor Last month at stackArmor, we announced the establishment of our AI Risk Management Center of Excellence (CoE), comprised of executives with strong operational backgrounds and experience driving ...

Immuta and Starburst enhance integration for growing data mesh security and access demands

Immuta unveiled its latest enhancements to its integration with Starburst to help joint customers meet increasing data mesh security and access demands. This update comes as Immuta continues to see strong customer adoption with Starburst users, ...

Why Some Organizations Become Victims of Repeat Ransomware Attacks

It’s not a matter of if, but when an organization falls victim to a cyberattack. Despite increased awareness of ransomware’s risks and despite organizations’ efforts to increase security measures, attackers seem to always stay one step ...

Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ zero-day

Executive summary In this blog post we list at least 10 open source packages affected by the HTTP/2 'Rapid Reset' vulnerability, disclosed by Cloudflare this week. The post Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ ...

Wallarm and MuleSoft empower users to tackle API threats

Wallarm today announced general availability of the seamless Application and API Security policy integration with MuleSoft AnyPoint Platform. In today’s digital landscape, business and technical leaders must ensure that their Apps and APIs ...

Backdoor Malware Found on WordPress Website Disguised as Legitimate Plugin

A backdoor deployed on a compromised WordPress website poses as a legitimate plugin to hide its presence. The post Backdoor Malware Found on WordPress Website Disguised as Legitimate Plugin appeared first on SecurityWeek.

Semperis enhances Forest Druid to guard against Microsoft Entra ID attacks

Semperis has expanded Forest Druid, its community-driven attack path management tool, to include support for Microsoft Entra ID (formerly Azure AD), saving time for cybersecurity teams in identifying and closing risky attack paths across hybrid ...

Apple Releases iOS 16 Update to Patch Exploited Vulnerability 

Apple has released iOS 16.7.1 and iPadOS 16.7.1 to patch CVE-2023-42824, a kernel vulnerability that has been exploited in attacks. The post Apple Releases iOS 16 Update to Patch Exploited Vulnerability  appeared first on SecurityWeek.