Application Security News and Articles


ZDI Discusses First Automotive Pwn2Own

The Zero Day Initiative (ZDI) will host a new Automotive Pwn2Own at the Automotive World Conference in Tokyo, January 24 to 26, 2024. The post ZDI Discusses First Automotive Pwn2Own appeared first on SecurityWeek.

Botmasters Unveiled: Exploring the Dual Role of Botnets in Today’s Digital Landscape

The duality of the botmaster underscores the versatility of botnets, making them a potent tool that can be leveraged for good or ill, depending on the intentions of the botmaster at the helm. In the realm of modern cyberattacks, there exists a ...

A Day In the Life with Security Solution Architect, Joshua Roback

The post A Day In the Life with Security Solution Architect, Joshua Roback appeared first on AI Enabled Security Automation. The post A Day In the Life with Security Solution Architect, Joshua Roback appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘A Halloween Carol’

via the comic artistry and dry wit of Randall Munroe, maker of XKCD! Permalink The post Randall Munroe’s XKCD ‘A Halloween Carol’ appeared first on Security Boulevard.

Imperfection in AI starts with a False Sense of Perfection.

Imperfection in AI starts with a False Sense of Perfection. 3 min read·Just now -- Artificial intelligence is rapidly becoming the needed technology to help advance society into the future. Without AI being part of our everyday lives, will ...

Breaking Down APRA CPS 230 Critical SaaS Operations Compliance

Learn how APRA CPS 230 mandates affect your cloud and SaaS stack, along with actionable steps to take to achieve compliance starting in July 2025. The post Breaking Down APRA CPS 230 Critical SaaS Operations Compliance appeared first on ...

The Art of Using Mind Maps to Improve Your API Hacking

Learn how to create mind maps that can help you improve your API hacking methodology during security testing and pentest engagements. The post The Art of Using Mind Maps to Improve Your API Hacking appeared first on Dana Epp's Blog. The post The ...

SIM Swapping Attacks Hit High-Profile Targets

Cybercriminals crave breaching the networks of large organizations. These large corporations hold vast amounts of sensitive information and often protect these assets with enterprise-grade security. Although breaking into these systems isn’t ...

Broken ARM: Mali Malware Pwns Phones

Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver. The post Broken ARM: Mali Malware Pwns Phones appeared first on Security Boulevard.

Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies

ShellTorch attack chains critical TorchServe vulnerabilities and could completely compromise the AI infrastructure of major companies. The post Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies appeared first on ...

DEF CON 31 – Thomas Chauchefoin’s, Paul Gerste’s ‘Visual Studio Code Is Why I Have Workspace Trust Issues’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

An Akamai report showed cyberattacks against APIs used in the financial services sector have increased 65% year-over-year. The post Akamai Sees Surge of Cyberattacks Aimed at Financial Services appeared first on Security Boulevard.

Open Redirect Flaws as a Phishing Tactic

Open redirect flaws have been around for quite a while. But with social engineering being such an effective tactic, threat actors are now combining their technical knowledge with psychological manipulation to make open redirects even more ...

Visibility is Not Enough to Protect Organizations from Identity Threats

Identity and access management (IAM) has become a critical component of any organization's security strategy. Implementing strict controls over user access and privileges is clearly important for protecting sensitive systems and data. However, ...

LogicMonitor Dexda offers contextualized data and observability capabilities

LogicMonitor announced that the company is bridging the AIOps gap with the launch of Dexda, an AI solution for hybrid observability. Using machine learning and Natural Language Processing (NLP) to automate insights and deliver a contextualized ...

Photos: Cybertech Europe 2023

The Cybertech Europe conference and exhibition takes place at La Nuvola Convention Center in Rome, and features the latest innovative solutions from dozens of companies and speakers, including senior government officials, C-level executives, and ...

Concentric AI enhances its DSPM solution with data lineage for better data protection and management

Concentric AI has unveiled that its Semantic Intelligence DSPM solution now offers data lineage functionality for organizations to better protect their data. As a result of this update to Concentric AI’s Semantic Intelligence, organizations can ...

US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform

An open redirection vulnerability in the popular job search platform Indeed has been exploited in a series of phishing attacks. The post US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform appeared first on SecurityWeek.

Wake-Up Call: New SEC Disclosure Rules Spark Incident Response Revolution

With its landmark cybersecurity breach disclosure rules, the SEC has sparked a perfect storm that will impact every public company’s incident response program. The post Wake-Up Call: New SEC Disclosure Rules Spark Incident Response Revolution ...

Akamai introduces new capabilities to simplify PCI DSS 4.0 compliance for organizations

Akamai has introduced new capabilities to its Client-Side Protection & Compliance product that are designed to help organizations ensure compliance with PCI DSS 4.0 JavaScript security requirements 6.4.3 and 11.6.1. The Payment Card Industry ...