Application Security News and Articles


ComplyCube Age Estimation prevents presentation attacks

ComplyCube has launched a new Age Estimation feature to safeguard minors online and protect the vulnerable. The new capability complements its existing IDV-based Age Verification solution, offering an alternative to businesses that require a ...

What Is Endpoint Detection and Response (EDR)?

Endpoint detection and response (EDR) is among the latest breed of security software designed to keep emerging and sophisticated cyberthreatsRead More The post What Is Endpoint Detection and Response (EDR)? appeared first on Kaseya. The post ...

Medius Fraud & Risk Detection helps organizations prevent fraud

Medius announces a new Fraud & Risk Detection product to help businesses proactively prevent fraud, and gain greater visibility and more control across the invoice to pay lifecycle. The new solution extends existing risk and compliance ...

Motel One Discloses Ransomware Attack Impacting Customer Data

Motel One says customer addresses and credit card information were compromised in a recent ransomware attack. The post Motel One Discloses Ransomware Attack Impacting Customer Data appeared first on SecurityWeek.

Cybersecurity M&A Roundup: 28 Deals Announced in September 2023

Twenty-eight cybersecurity-related merger and acquisition (M&A) deals were announced in September 2023. The post Cybersecurity M&A Roundup: 28 Deals Announced in September 2023 appeared first on SecurityWeek.

Android’s October 2023 Security Updates Patch Two Exploited Vulnerabilities

The October 2023 security update for Android patches two vulnerabilities exploited in attacks, both likely linked to spyware vendors. The post Android’s October 2023 Security Updates Patch Two Exploited Vulnerabilities appeared first on ...

Companies Address Impact of Exploited Libwebp Vulnerability 

Companies have addressed the impact of the exploited Libwebp vulnerability CVE-2023-4863 on their products.  The post Companies Address Impact of Exploited Libwebp Vulnerability  appeared first on SecurityWeek.

Elliptic Curve Cryptography Explained

Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital ...

Zero Trust Architecture: Beyond the Buzzword

Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just as a trendy term, but as a ...

Top Cloud Privileged Access Management Solution Providers for Your Type of Organization

Gartner recently released its annual Magic Quadrant for Privileged Access Management (PAM), offering insights into the leading solutions in the PAM space. While Gartner’s list is comprehensive and a good resource for those looking into PAM ...

Cybersecurity Awareness Month 2023: Five Reasons You Need Automatic Software Updates for Your Application Security.

To mark Cybersecurity Awareness Month 2023, discover five key reasons why automated software updates are so vital for your application security. The post Cybersecurity Awareness Month 2023: Five Reasons You Need Automatic Software Updates for ...

Evolving conversations: Cybersecurity as a business risk

Board members often lack technical expertise and may not fully grasp cyber risks. On the other hand, CISOs are more accustomed to interfacing with IT staff. This is understandable; the board is responsible for guiding high-level decision-making. ...

NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

“Is our critical infrastructure truly secure in the face of ever-evolving cyber risks and insider threats?” This question resonates with an urgency that cannot be disregarded in a world where technology is woven into every facet of our ...

CISO’s compass: Mastering tech, inspiring teams, and confronting risk

In this Help Net Security interview, Okey Obudulu, CISO at Skillsoft, talks about the increasing complexity of the CISO role and challenges they face. He discusses the business environment, tech innovation, the evolving regulatory landscape, ...

GenAI in software surges despite risks

In this Help Net Security video, Ilkka Turunen, Field CTO at Sonatype, discusses how generative AI influences and impacts software engineers’ work and the software development lifecycle. According to a recent Sonatype survey of 800 ...

Chalk: Open-source software security and infrastructure visibility tool

Chalk is a free, open-source tool that helps improve software security. You add a single line to your build script, and it will automatically collect and inject metadata into every build artifact: source code, binaries, and containers. Gaining ...

Mirai Botnet’s New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught

I. Abstract In September 2023, NSFOCUS global threat hunting system monitored several new botnet variant families developed based on Mirai, among which hailBot, kiraiBot and catDDoS are the most active, are accelerating their spread, and are ...

Barriers preventing organizations from DevOps automation

Organizations’ investments in DevOps automation are delivering significant benefits, including a 61% improvement in software quality, a 57% reduction in deployment failures, and a 55% decrease in IT costs, according to Dynatrace. In most ...

A Closer Look at Prospect Medical Holdings’ Ransomware Nightmare

Medical service providers have increasingly become prime targets for cyber attackers, primarily due to the wealth of personal and medical information they store. It’s crucial to understand the magnitude of such breaches, not just in terms of ...

Building a Career in Cyber Security: The Biggest Lie

TL;DR: Cybersecurity is a complex and challenging field, and it's important to have realistic expectations about what it takes to get started. Don't believe the hype that you can become a cyber security expert overnight. The post Building a ...