Application Security News and Articles


Typosquatting campaign delivers r77 rootkit via npm

ReversingLabs researchers have identified a new, malicious supply chain attack affecting the npm platform. The “typosquatting” campaign first appeared in August and pushed a malicious package, node-hide-console-windows, which downloaded a ...

Google unveils stricter anti-spam rules for bulk email senders

To keep Gmail users’ inboxes “safer and more spam-free”, Google is introducing new requirements for bulk senders (of commercial email). “Last year we started requiring that emails sent to a Gmail address must have some ...

Liongard collaborates with Cork to boost MSP cyber resilience

Liongard unveiled a strategic alliance with Cork, a purpose-built cyber warranty company for MSPs serving small businesses and the ISV solutions they manage. Through this new collaboration, Liongard’s network of over 1,600 MSPs and MSSPs ...

Cybertech Europe 2023 video walkthrough

In this Help Net Security video, we take you inside Cybertech Europe 2023 at La Nuvola Convention Center in Rome. The video features the following vendors: Accenture, Armis, Atlantica, Cisco, Cloudflare, CyberArk, Cyber Guru, Cybergym, DGS, ...

Qualcomm Patches 3 Zero-Days Reported by Google

Qualcomm has patched more than two dozen vulnerabilities, including three zero-days that may have been exploited by spyware vendors. The post Qualcomm Patches 3 Zero-Days Reported by Google appeared first on SecurityWeek.

Amazon: AWS root accounts must have MFA enabled

Amazon wants to make it more difficult for attackers to compromise Amazon Web Services (AWS) root accounts, by requiring those account holders to enable multi-factor authentication (MFA). MFA options for AWS accounts AWS provides on-demand cloud ...

Mastering SECaaS: Your Ultimate Implementation Guidance for 2023

Introduction Security as a Service (SECaaS) has emerged as a game-changer for businesses of all sizes. Offering a subscription-based model, SECaaS eliminates hefty upfront costs, making cybersecurity more accessible than ever. But the benefits ...

Making privacy sustainable: Incorporating privacy into the ESG agenda

Data breaches have been rising in frequency and magnitude over the last two decades. In fact, the Identity Theft Resource Centre (ITRC) found that between 2005 and 2020, data breach events in the US alone increased from 57 to over 1001 – ...

Tackling cyber risks head-on using security questionnaires

In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments and accountability across all participants in the technology supply ...

Understanding the layers of LLM security for business integration

In this Help Net Security video, Ivana Bartoletti, Global Privacy Officer at Wipro, discusses how organizations should deal with and deploy LLMs securely. Those who push the apocalypse scenario of monster machines taking over the world and ...

Cybersecurity preparedness pays big dividends for businesses

Businesses are taking cybersecurity more seriously by boosting resources and preparedness, according to GetApp. US businesses on the whole are gaining ground against cybercriminals after several years of increasingly severe threats, but the Las ...

Factors leading to organizations losing control over IT and security environments

Companies are challenged with the growing need to connect everything in their business while maintaining control over their security, productivity, and competitive growth, according to Cloudflare. “Today, the big clouds have built business ...

23 NYCRR 500 Shadow IT SaaS Provisions

Understand what 23 NYCRR 500 requires for shadow IT SaaS governance, data protection, and overall security operational integrity. The post 23 NYCRR 500 Shadow IT SaaS Provisions appeared first on Security Boulevard.

Certificate Authorities: What They Are & Why They’re Important

CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo. Certificate authorities play a central role in modern web security, and yet, many people are ...

Harness the Power of Your Identity Data

It's no secret that growing revenue through digital channels is a do-or-die business requirement. And the quality of digital experiences offered through these channels is a key factor in meeting your customer acquisition, engagement, and ...

The MGM attack: What can be learned for your business

The post The MGM attack: What can be learned for your business appeared first on Click Armor. The post The MGM attack: What can be learned for your business appeared first on Security Boulevard.

DEF CON 31 – Ben Nassi’s, Ofek Vayner’s ‘Video Based Cryptanalysis Extracting Keys From Power LEDs’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

ReversingLabs A1000 Threat Analysis and Hunting Solution Update Drives SecOps Forward

Our customers rely on ReversingLabs A1000 Threat Analysis and Hunting Solution to provide an instant malware lab, delivering static and dynamic analysis. Here, we break down the newest improvements to this necessary solution. The post ...

AWS’ MadPot Honeypot Operation Corrals Threat Actors

Engineers with Amazon Web Services more than a decade ago began developing tools to better collect intelligence on the cyberthreats coming into the giant cloud provider’s IT environment Fast forward to now, and AWS’s sophisticated suite of ...

Synqly Joins Race to Fix Security, Infrastructure Product Integrations

Silicon Valley startup lands $4 million in seed funding from SYN Ventures, Okta Ventures and Secure Octane. The post Synqly Joins Race to Fix Security, Infrastructure Product Integrations appeared first on SecurityWeek.