Application Security News and Articles


Veza launches Next-Gen IGA to help enterprises reduce identity risks

Veza launched its Next-Gen IGA (Identity Governance and Administration) solution. The solution comprises the Veza Access Control Platform and new products for provisioning and deprovisioning, access reviews, access visibility, and access ...

Box Allies With CrowdStrike to Better Secure Files

A Box, Inc. and CrowdStrike alliance will make tools available to secure files and data shared via Box's cloud service. The post Box Allies With CrowdStrike to Better Secure Files appeared first on Security Boulevard.

Citrix Patches Critical NetScaler ADC, Gateway Vulnerability

Citrix has released patches for a critical information disclosure vulnerability in NetScaler ADC and NetScaler Gateway. The post Citrix Patches Critical NetScaler ADC, Gateway Vulnerability appeared first on SecurityWeek.

Ashade Tech TrustPattern provides printable smartcard functions with dual authentication

Ashade Tech launched TrustPattern, a technology that facilitates storing information on any surface using image pattern recognition. The technology encodes data using advanced computer algorithms, generating image patterns that can be printed on ...

7 Best Practices for Securing Your MacBook

To prevent any cyberattack you need to fortify your systems including the laptop that you use. Here are 7 best practice for securing your MacBook. The post 7 Best Practices for Securing Your MacBook appeared first on Security Boulevard.

Egnyte releases Document Room to streamline the sharing of large volumes of sensitive documents

Egnyte has launched Egnyte Document Room, a new solution powered by Egnyte’s secure platform for content collaboration and governance. With Egnyte Document Rooms, Egnyte customers can now create highly controlled, custom-branded environments ...

How to Combat ‘Pig Butchering’ Scams with Decision Intelligence

Ever since people started exchanging goods and services, there has been a risk of one party scamming the other. And there has always been a risk of a third party scamming both the seller and the buyer. In recent years, fraud has taken on new ...

Blackpoint Cyber expands cloud security with Identity Response for Azure AD

Blackpoint Cyber launched a brand-new Cloud Response feature, Identity Response for Azure AD. In light of the surge in identity-based attacks, where threat actors exploit victims’ login credentials from compromised services or successful ...

US Government Releases Security Guidance for Open Source Software in OT, ICS

CISA, FBI, NSA, and US Treasury published new guidance on improving the security of open source software in OT and ICS. The post US Government Releases Security Guidance for Open Source Software in OT, ICS appeared first on SecurityWeek.

Survey Sees Cyberattacks Impacting Primary Health Care Services

A Proofpoint survey found the majority of health care organizations experienced an average of 40 attacks in the past 12 months. The post Survey Sees Cyberattacks Impacting Primary Health Care Services appeared first on Security Boulevard.

Cybersecurity and Open Source Experts Up In Arms About the CRA

Provisions in the EU's proposed Cyber Resilience Act drew more fire from high-profile cybersecurity and open source technology advocates. The post Cybersecurity and Open Source Experts Up In Arms About the CRA appeared first on Security Boulevard.

Pure Storage launches Pure Protect//DRaaS for enhanced enterprise operations

Pure Storage has unveiled critical new data resilience offerings, including the introduction of Pure Protect//DRaaS, a unique Disaster Recovery as a Service (DRaaS) solution, new energy efficiency guarantees for its Evergreen portfolio, and ...

Chrome 118 Patches 20 Vulnerabilities

Google has released Chrome 118 to the stable channel with patches for 20 vulnerabilities, including one rated ‘critical severity’. The post Chrome 118 Patches 20 Vulnerabilities appeared first on SecurityWeek.

Critical Atlassian Confluence vulnerability exploited by state-backed threat actor

A critical flaw in Atlassian Confluence Data Center and Server (CVE-2023-22515) has been exploited by a state-backed threat actor, Microsoft’s threat analysts have pinpointed. About the vulnerability CVE-2023-22515 was initially classified ...

Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks

Organizations respond to HTTP/2 Rapid Reset zero-day vulnerability exploited to launch the largest DDoS attacks seen to date.  The post Organizations Respond to HTTP/2 Zero-Day Exploited for DDoS Attacks appeared first on SecurityWeek.

BlackBerry and AWS introduce two UEM innovations

BlackBerry announced two major new Unified Endpoint Management (UEM) innovations – BlackBerry UEM at the edge and BlackBerry UEM for the IoT. BlackBerry UEM software is used for managing, monitoring, and securing all of an organization’s ...

Securing Your Smart Home: How to Safeguard Your Home Network

In today’s interconnected world, our homes are more than just a physical space; they’ve become digital ecosystems. From smart TVs and speakers to cameras and doorbells, our homes are brimming with internet-enabled devices that make our lives ...

Applying AI to API Security

While there is quite a bit of buzz and hype around AI, it is a technology that can add tremendous value to security programs. The post Applying AI to API Security appeared first on SecurityWeek.

The Evolving Work of the CISO in 2024

The challenges, responsibilities, and the modern cybersecurity battlefield for CISOs in 2024  I speak to many cybersecurity professionals, and if there’s one ongoing and pervasive concern they all highlight about the nature of their role, ...

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)

Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older curl versions have been released, too. Preparation for the security ...