Application Security News and Articles


Identity Threat Protection with Okta AI combats identity-based attacks

Okta announced Identity Threat Protection with Okta AI (Identity Threat Protection), a new product for Okta Workforce Identity Cloud that delivers real-time detection and response for identity-based threats. Built with Okta AI and powered by ...

Top 3 Tips Learned from Getting Fairwinds Insights into AWS Marketplace

The AWS Marketplace has grown extensively over the years, and it has a significant impact on how we buy solutions in the cloud. This is one of the many reasons that we’ve been talking about making Fairwinds Insights available in AWS Marketplace ...

Qualcomm patches 3 actively exploited zero-days

Qualcomm has fixed three actively exploited vulnerabilities (CVE-2023-33106, CVE-2023-33107, CVE-2023-33063) in its Adreno GPU and Compute DSP drivers. Vulnerabilities exploited in Qualcomm GPU and DSP drivers The US-based semiconductor company ...

New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks

Supermicro has released BMC IPMI firmware updates to address multiple vulnerabilities impacting select motherboard models. The post New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks appeared first on SecurityWeek.

Azul Code Inventory identifies dead and unused source code for removal

Azul announced Code Inventory, a new feature of Azul Vulnerability Detection that provides developers and DevOps teams a precise catalog of the source code actually used in production by Java applications, making it easy to accurately identify ...

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks

Nutanix extended an ability to detect threats that can be addressed by kicking off a recovery process that takes less than 20 minutes to execute. The post Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks appeared first on Security ...

10 Best Practice Frameworks to Mitigate Big Data Security Issues

This blog reviews primary data security risks associated with big data and the recommended frameworks companies can apply to safeguard big data. The post 10 Best Practice Frameworks to Mitigate Big Data Security Issues appeared first on Security ...

Available Now: Java Endpoint Analyzer from Onapsis Research Labs

Available Now: Java Endpoint Analyzer from Onapsis Research Labs ltabo Wed, 10/04/2023 - 13:15   Last week, Onapsis Research Labs launched a new Java Endpoint Analyzer to the community to help identify SAP endpoints. In the spirit of ...

Cloaked’s privacy app and web-based platform put people in control of their personal data

Cloaked has launched its privacy app and web-based platform that gives people control of their personal data by creating unlimited, secure identities, including working phone numbers, emails, usernames and passwords, in real time. As it exits ...

The Crucial Difference Between Pre- and Post-Delivery Email Scanning

Some major cybersecurity vendors are demonstrating significant flaws because their solutions don’t filter emails until after they reach the Exchange server. The post The Crucial Difference Between Pre- and Post-Delivery Email Scanning appeared ...

Lyca Mobile Services Significantly Disrupted by Cyberattack

International mobile network operator Lyca Mobile says a cyberattack has significantly disrupted its services in many countries. The post Lyca Mobile Services Significantly Disrupted by Cyberattack appeared first on SecurityWeek.

Top Benefits of using Microsoft Dynamics 365 in the Financial Sector

In today’s cutthroat financial services industry, efficiently maintaining customer connections is essential to development and profitability. A CRM system is necessary to maintain client interactions whether your business is in insurance, asset ...

Elevate Security Adaptive Trust helps security teams triage and prioritize security events

Elevate Security announced Adaptive Trust solution, enabling Microsoft customers deeper insight into high risk workers who are frequently targeted by attackers and enabling defenders to take action on these insights by dynamically deploying ...

Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions

A local privilege escalation vulnerability (CVE-2023-4911) in the GNU C Library (glibc) can be exploited to gain full root privileges. The post Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions appeared first on ...

CellTrust and Theta Lake join forces to manage mobile communications risks

CellTrust has unveiled its SL2 product integration with Theta Lake to provide organizations with a solution for managing compliance and mitigating risks associated with mobile communications such as WhatsApp. The integration of CellTrust’s ...

Google, Yahoo Boosting Email Spam Protections

Google and Yahoo are introducing new requirements for bulk senders, to improve phishing and spam protections. The post Google, Yahoo Boosting Email Spam Protections appeared first on SecurityWeek.

Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware 

Mozilla issues warning over fake Thunderbird downloads after a ransomware group was caught using this technique to deliver malware. The post Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware  appeared first on SecurityWeek.

Typosquatting campaign delivers r77 rootkit via npm

ReversingLabs researchers have identified a new, malicious supply chain attack affecting the npm platform. The “typosquatting” campaign first appeared in August and pushed a malicious package, node-hide-console-windows, which downloaded a ...

Google unveils stricter anti-spam rules for bulk email senders

To keep Gmail users’ inboxes “safer and more spam-free”, Google is introducing new requirements for bulk senders (of commercial email). “Last year we started requiring that emails sent to a Gmail address must have some ...

Liongard collaborates with Cork to boost MSP cyber resilience

Liongard unveiled a strategic alliance with Cork, a purpose-built cyber warranty company for MSPs serving small businesses and the ISV solutions they manage. Through this new collaboration, Liongard’s network of over 1,600 MSPs and MSSPs ...