Application Security News and Articles


Eyes everywhere: How to safely navigate the IoT video revolution

Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). Vacuum cleaners, bird feeders, connected cars and even smart ovens now come ...

CVE-2023-38545, A High Severity cURL and libcurl CVE, to be published on October 11th

New Information From Rezilion Research A high-severity cURL vulnerability (CVE-2023-38545) is expected to be published in tandem with the 8.4.0 releases of the package on October 11th. While not much is known about the nature of the ...

Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia

Executive Summary  EclecticIQ analysts identified a cyber espionage campaign where threat actors used a variant of HyperBro loader with a Taiwan Semiconductor Manufacturing (TSMC) lure, likely to target the semiconductor industry in ...

Execution of Arbitrary JavaScript in Android Application

In this blog, we will learn about the possible ways to find cross-site scripting by abusing JavaScript in Android applications. Cross-site scripting (XSS) in an Android application occurs when an attacker successfully injects malicious scripts ...

Top Azure WAF Alternatives in 2023

Discover the pros and cons of Azure WAF and the top 5 Azure alternatives, including AppTrana, Akamai, Imperva, Cloudflare & AWS WAF. The post Top Azure WAF Alternatives in 2023 appeared first on Indusface. The post Top Azure WAF Alternatives ...

Security Spotlight: Monitoring Virtual Network Computing

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security ...

LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the barrier for entry to ...

High-business-impact outages are incredibly expensive

In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to better service-level metrics, such as fewer, shorter outages and lower ...

NSFOCUS Receives CNVD Outstanding Contribution Award for Original Vulnerability Submission

The CNVD (China National Vulnerability Database) platform recently initiated the 2022 annual technical group support unit’s capability assessment. A comprehensive assessment was conducted across six capability domains, including vulnerability ...

Soft skills continue to challenge the cybersecurity sector

New cybersecurity findings pinpoint areas where cybersecurity experts are lacking, with interpersonal skills, cloud computing, and security measures standing out as the most prominent skill deficiencies in cybersecurity specialists, according to ...

The root cause of open-source risk

2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses known and avoidable risks. Vulnerabilities can still be prevented ...

Preventing fraud in the iGaming industry

Discover why fraud prevention is vital for iGaming success, and how to protect your business and players. The post Preventing fraud in the iGaming industry appeared first on Sift Blog. The post Preventing fraud in the iGaming industry appeared ...

Play the Password Game!

A clever person has hosted a Password Game. Give it a try! The post Play the Password Game! appeared first on Security Boulevard.

Exclusive Report: The Rise of Credit Union Brand Impersonations Online in 2023

As a credit union member, I find myself thwarting inbound scam attempts far more often than I used to. Between fake phone calls with deceiving caller… The post Exclusive Report: The Rise of Credit Union Brand Impersonations Online in 2023 ...

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and increasingly connected digital ...

Automated Incident Response with Rapid7 and Smart SOAR

Integration between platforms has become a necessity rather than a nice-to-have. Smart SOAR offers a single platform to act as the connective tissue between siloed point solutions that do not natively integrate with each other. Specifically, the ...

DevSecOps Trend Drivers

The post DevSecOps Trend Drivers appeared first on CodeSecure. The post DevSecOps Trend Drivers appeared first on Security Boulevard.

DEF CON 31 – Daniel Wegemer’s ‘Unlocking Hidden Powers In Xtensa Based Qualcomm Wifi Chips’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Fortifying Cybersecurity in the Finance Industry with Managed Detection & Response

Financial institutions are entrusted with a vast treasure trove of sensitive data. In this digital age, protecting this data and maintaining customer trust is paramount. Managed Detection & Response (MDR) emerges as a powerful ally for ...

Gartner® Hype Cycle™ for Endpoint Security, 2023

Security Operations leaders must balance increased visibility, better prioritization of risks, and a focus on business outcomes. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared first on SafeBreach. The post Gartner® Hype ...