Application Security News and Articles


Exim Remote Code Execution Vulnerability (CVS 2023-42115) Notification

Overview Recently, NSFOCUS CERT detected an Exim remote code execution vulnerability (CVE-2023-42115). When external authentication is enabled, due to improper user input verification, an unauthenticated attacker can remotely exploit this ...

Cloud Misconfigurations Expose Over 400K Buckets and 10.4B Files to Public Access!

Cloud misconfigurations have emerged as a major security threat. This led to over 400,000 buckets and 10.4 billion data exposed to the public. Are your sensitive data and personal files truly secure in the cloud? The development of cloud storage ...

Why zero trust delivers even more resilience than you think

Ten years ago, zero trust was an exciting, innovative perspective shift that security experts were excited to explore; today, it’s more likely to be framed as an inevitable trend than as a mere option on the security menu. At the same time, ...

Turning military veterans into cybersecurity experts

In this Help Net Security interview, James Murphy, the Director of the TechVets Programme at the Forces Employment Charity, discusses the challenges that military veterans face when transitioning from military to civilian life. One significant ...

Why security is the bedrock of success for mainframe projects

Enterprises looking to update their mission-critical operations are approaching modernization in three ways – modernizing on the mainframe, integrating with the hyperscalers, or moving off to the cloud, according to a recent Kyndryl report. ...

Cybersecurity pros predict rise of malicious AI

76% of cybersecurity professionals believe the world is very close to encountering malicious AI that can bypass most known cybersecurity measures, according to Enea. 26% see this happening within the next year, and 50% in the next 5 years. ...

Cybercriminals can go from click to compromise in less than a day

The median dwell time in ransomware engagements dropped to just under 24 hours from 4.5 days in the previous year and 5.5 days in the year before that, according to SecureWorks. In 10% of cases, ransomware was even deployed within five hours of ...

eBook: Cybersecurity career hacks for newcomers

Are you excited to pursue a cybersecurity career but unsure where to begin? Whether you’re a student, an incoming professional, or ready to work in a different field, the tried-and-tested career hacks in this eBook will help you get your start ...

Five Key Takeaways From the New NSA and CISA IAM Guidance

On October 4, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) jointly released new guidance titled Identity and Access Management: Developer and Vendor Challenges, which addresses ...

Phishers Spoof USPS, 12 Other Natl’ Postal Services

Recent weeks have seen a sizable uptick in the number of phishing scams targeting U.S. Postal Service (USPS) customers. Here's a look at an extensive SMS phishing operation that tries to steal personal and financial data by spoofing the USPS, as ...

Meet Hackie-AI, The New Kid on the Block.

Meet Hackie-AI, The New Kid on the Block. 2 min read·Just now -- Seeing global hackers on Interpol, FBI, and Scotland Yard’s top ten list may soon become a thing of the past. Replacing the actual hackers is the evolution of the ...

The Ultimate Guide to Compliance Framework Crosswalking

The compliance landscape is complex and ever-evolving, with new framework and control requirements emerging all the time. This is especially challenging for small and medium-sized businesses (SMBs) that may not have the resources or expertise to ...

FTC: Americans lost $2.7 Billion Since 2021 to Social Media Scams

Americans lost a whopping $2.7 billion in scams that reached them via social media, and the actual figure could be much higher, according to the Federal Trade Commission (FTC). Of those who reported losing money to fraud over the past two years, ...

ForgeRock Identity Platform 7.4: Stronger Security, Faster Innovation, and Better User Experiences

Digital organizations face unprecedented challenges. There's incredible pressure to innovate ahead of the competition and deliver digital experiences that help to acquire, retain, and build loyalty with customers — all while fending off ...

Perfect Loader Implementations

Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub. TLDR: You may use fuse-loader or perfect-loader as examples for extending an OS’s native loader to support in-memory ...

Security Scanning Tools Defined: SAST, IaC, SCA, DAST, IAST/RASP, Container Runtime Security and Runtime SCA

... Read more » The post Security Scanning Tools Defined: SAST, IaC, SCA, DAST, IAST/RASP, Container Runtime Security and Runtime SCA appeared first on Deepfactor. The post Security Scanning Tools Defined: SAST, IaC, SCA, DAST, IAST/RASP, ...

How to Protect Against Data Lake Hacking

Data lakes, or centralized repositories for large-scale data, are a popular solution for data storage, and there are good reasons for that. Data lakes are flexible and cost-effective, as they allow many object formats and multiple query engines, ...

A Growing Cyberwar in the Widening Israeli-Hamas Conflict

The unprecedented assault by Hamas on Israel over the weekend brought with it cyberattacks by a number of known threat groups, echoing what was seen in the runup and aftermath of Russia’s invasion of Ukraine early last year. It’s a reminder ...

Unlock 2023’s Patch Management Best Practices: What You’re Missing

Introduction In 2023, patch management best practices are more crucial than ever for safeguarding your cybersecurity infrastructure. As cyber threats evolve, staying updated with the latest patches can mean the difference between a secure network ...

News alert: Georgia State receives a $10 million grant to research AI, robotics and edge computing

Atlanta, GA, Oct. 9, 2023 —  Jonathan Shihao Ji, a computer science professor at Georgia State University, has received a $10 million grant from the Department of Defense (DoD) to address critical problems in artificial intelligence (AI) and ...