Application Security News and Articles


Robust Intelligence collaborates with MongoDB to secure generative AI models

Robust Intelligence announced a partnership with MongoDB to help customers secure generative AI models enhanced with enterprise data. The offering combines Robust Intelligence’s real-time AI Firewall with MongoDB Atlas Vector Search for an ...

Qakbot Hackers Continue to Push Malware After Takedown Attempt

Qakbot cybercriminals continue to push malware, which shows they are still operational after the recent takedown attempt. The post Qakbot Hackers Continue to Push Malware After Takedown Attempt appeared first on SecurityWeek.

Addressing the People Problem in Cybersecurity

Addressing the people problem with effective approaches and tools for users and security practitioners will enable us to work smarter, and force attackers into a position where they must work harder. The post Addressing the People Problem in ...

Apple patches another iOS zero-day under attack (CVE-2023-42824)

Apple has released a security update for iOS and iPadOS to fix another zero-day vulnerability (CVE-2023-42824) exploited in the wild. About CVE-2023-42824 CVE-2023-42824 is a kernel vulnerability that could allow a local threat actor to elevate ...

AWS Managed Services – Your Key to a Cost-Effective Cloud Infrastructure

Discover how AWS Managed Services can optimize your cloud infrastructure and reduce costs. Learn about its benefits, features, and how to get started. The post AWS Managed Services – Your Key to a Cost-Effective Cloud Infrastructure first ...

Hundreds Download Malicious NPM Package Capable of Delivering Rootkit

Threat actor uses typosquatting to trick hundreds of users into downloading a malicious NPM package that delivers the r77 rootkit. The post Hundreds Download Malicious NPM Package Capable of Delivering Rootkit appeared first on SecurityWeek.

Critical Atlassian Confluence zero-day exploited by attackers (CVE-2023-22515)

Atlassian has fixed a critical zero-day vulnerability (CVE-2023-22515) in Confluence Data Center and Server that is being exploited in the wild. “Atlassian has been made aware of an issue reported by a handful of customers where external ...

Sony Confirms Data Stolen in Two Recent Hacker Attacks

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups.  The post Sony Confirms Data Stolen in Two Recent Hacker Attacks appeared first on SecurityWeek.

10 Bot Detection Tools for 2023: Features & Mitigation Methods

The surge of malicious bots poses a significant online security risk for your business. Bots can scrape your website content, spam comments, take down your website with DDoS attacks, and try to force their way into your user or corporate ...

Eyes everywhere: How to safely navigate the IoT video revolution

Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). Vacuum cleaners, bird feeders, connected cars and even smart ovens now come ...

CVE-2023-38545, A High Severity cURL and libcurl CVE, to be published on October 11th

New Information From Rezilion Research A high-severity cURL vulnerability (CVE-2023-38545) is expected to be published in tandem with the 8.4.0 releases of the package on October 11th. While not much is known about the nature of the ...

Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia

Executive Summary  EclecticIQ analysts identified a cyber espionage campaign where threat actors used a variant of HyperBro loader with a Taiwan Semiconductor Manufacturing (TSMC) lure, likely to target the semiconductor industry in ...

Execution of Arbitrary JavaScript in Android Application

In this blog, we will learn about the possible ways to find cross-site scripting by abusing JavaScript in Android applications. Cross-site scripting (XSS) in an Android application occurs when an attacker successfully injects malicious scripts ...

Top Azure WAF Alternatives in 2023

Discover the pros and cons of Azure WAF and the top 5 Azure alternatives, including AppTrana, Akamai, Imperva, Cloudflare & AWS WAF. The post Top Azure WAF Alternatives in 2023 appeared first on Indusface. The post Top Azure WAF Alternatives ...

Security Spotlight: Monitoring Virtual Network Computing

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security ...

LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the barrier for entry to ...

High-business-impact outages are incredibly expensive

In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to better service-level metrics, such as fewer, shorter outages and lower ...

NSFOCUS Receives CNVD Outstanding Contribution Award for Original Vulnerability Submission

The CNVD (China National Vulnerability Database) platform recently initiated the 2022 annual technical group support unit’s capability assessment. A comprehensive assessment was conducted across six capability domains, including vulnerability ...

Soft skills continue to challenge the cybersecurity sector

New cybersecurity findings pinpoint areas where cybersecurity experts are lacking, with interpersonal skills, cloud computing, and security measures standing out as the most prominent skill deficiencies in cybersecurity specialists, according to ...

The root cause of open-source risk

2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses known and avoidable risks. Vulnerabilities can still be prevented ...