Application Security News and Articles


Fortinet unveils two high-performance switches to securely connect the modern campus

Fortinet announced two new campus switches, the FortiSwitch 600 and 2000. These switches support the growing connectivity and security needs of the campus with high performance, embedded intelligence, and seamless integration with Fortinet’s ...

How Process Automation Can Help Streamline Security

Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture. The post How Process Automation Can Help Streamline Security appeared first on Security Boulevard.

AI More Helpful Than Harmful in Cybersecurity

The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against. The post AI More Helpful Than Harmful in Cybersecurity appeared first on Security Boulevard.

Flexxon Xsign protects sensitive data reserved only for authorized personnel

Flexxon launched its latest security product, Xsign. Now available globally, the Xsign provides enhanced security through an innovative approach to unlocking sensitive data reserved only for authorized personnel. With the use of the Xsign ...

EasyDMARC Becomes fTLD Strategic Partner

fTLD and EasyDMARC Join Forces to Provide Banks ... The post EasyDMARC Becomes fTLD Strategic Partner appeared first on EasyDMARC. The post EasyDMARC Becomes fTLD Strategic Partner appeared first on Security Boulevard.

Patches Prepared for ‘Probably Worst’ cURL Vulnerability

A high-severity vulnerability in the data transfer project cURL will be addressed with libcurl and curl updates this week. The post Patches Prepared for ‘Probably Worst’ cURL Vulnerability appeared first on SecurityWeek.

Cloud Security Solutions for Healthcare Challenges

Rapid digitalization in the healthcare sector has ushered in a new era of possibilities, revolutionizing patient care and operational effectiveness. As healthcare businesses move their data and systems to the cloud, a number of security issues ...

AI Risks

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines, one would hope that the rapid gains in AI technology have also brought forth a ...

Hackuity 2.0 improves how teams identify, prioritise, and remediate vulnerabilities

Hackuity launched a Version 2.0 of its next generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Hackuity’s intelligent Risk-Based Vulnerability Management combines threat ...

DC Board of Elections Discloses Data Breach

The District of Columbia Board of Elections says voter records were compromised in a data breach at hosting provider DataNet. The post DC Board of Elections Discloses Data Breach appeared first on SecurityWeek.

$2.7 billion lost to social media scams since 2021

Scams originating on social media have accounted for $2.7 billion in reported losses since 2021, more than any other contact method, according to the Federal Trade Commission. Social media gives scammers an edge in several ways. They can easily ...

Google Expands Bug Bounty Program With Chrome, Cloud CTF Events

Google is hosting capture the flag (CTF) events focused on Chrome’s V8 engine and on Kernel-based Virtual Machine (KVM). The post Google Expands Bug Bounty Program With Chrome, Cloud CTF Events appeared first on SecurityWeek.

Microsoft 365 email senders urged to implement SPF, DKIM and DMARC

In the wake of Google’s announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods. “These Domain Name Service (DNS) email authentication ...

Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks 

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack. The post Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks  appeared first on SecurityWeek.

Exploit writers invited to probe Chrome’s V8 engine, Google Cloud’s KVM

Google is asking bug hunters and exploit writers to develop 0-day and n-day exploits in Chrome’s V8 JavaScript engine and Google Cloud’s Kernel-based Virtual Machine (KVM). “We want to learn from the security community to ...

Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: Setting IoT security standards At Black Hat ...

Happy Thanksgiving Canada / Joyeux Thanksgiving Canada

Infosecurity.US Wishes Our Family, Friends And All Canadians Everywhere, A Safe And Happy Thanksgiving 9 October 2023! / Infosecurity.US souhaite à notre famille, à nos amis et à tous les Canadiens du monde entier, un joyeux et joyeux ...

What is DAST?

In today’s era of heightened cyber threats, safeguarding your online enterprise against application layer attacks is paramount.Continue reading on Medium »

Insider Risk Digest: Week 39-40

This Article Insider Risk Digest: Week 39-40 was first published on Signpost Six. | https://www.signpostsix.com/ Insider Highlights: Every two weeks, we bring you a round-up of the cases and stories that caught ...

Selective disclosure in the identity wallet: How users share the data that is really needed

Name, date of birth, address, email address, passwords, tax records, or payroll – all this sensitive user data is stored by companies in huge databases to identify individuals for digital services. Although companies have long applied limits to ...