Application Security News and Articles


Critical zero-days in Exim revealed, only 3 have been fixed

Six zero-days in Exim, the most widely used mail transfer agent (MTA), have been revealed by Trend Micro’s Zero Day Initiative (ZDI) last Wednesday. Due to what seems to be insufficient information and poor communication, fixes for only ...

Duality Technologies joins AWS Partner Network to provide secure data collaboration

Duality Technologies has joined the Amazon Web Services (AWS) Partner Network (APN) and launched its secure data collaboration platform in AWS Marketplace. Duality Technologies underwent the comprehensive AWS Foundational Technical Review (FTR) ...

Boards are Finally Taking Cybersecurity Seriously

It's time to ensure boards' interest in cybersecurity goes beyond just conversation and into real action. The post Boards are Finally Taking Cybersecurity Seriously appeared first on Security Boulevard.

Survey Sees More Cyberattacks Targeting APIs

Despite increased vigilance, most organizations suffered an API security incident in the last 12 months. The post Survey Sees More Cyberattacks Targeting APIs appeared first on Security Boulevard.

SymphonyAI accelerates financial crime investigations with generative AI technology

SymphonyAI announced the Sensa Investigation Hub, a generative AI-enabled investigation and case management platform that propels financial institutions into the future of financial crime management. The Sensa Investigation Hub uses predictive ...

Cloud-Native SIEM Made Easy with LogRhythm Axon

With the ever widening talent gap in cybersecurity and the expanding complexity of the cloud, organizations need an intuitive Security Information and Event Management platform (SIEM) that ensures seamless threat detection, investigation, and ...

Threat Hunting with LogRhythm NDR

At LogRhythm, we’re constantly looking for ways to make the life of a security analyst easier and that is why we are always listening to our customers to prioritize the features that matter. With this LogRhythm NDR release, we enhanced… The ...

GRC Automation: The Competitive Edge for Enterprises

Governance, risk, and compliance (GRC) form the pillars upon which organizations build their operations to ensure security, resilience, and adherence to regulations. However, as IT infrastructure becomes more complex and regulations grow ...

Cut Log Source Onboarding Time by 50% with LogRhythm SIEM

Today it seems like more organizations are asking security teams to do more with less.  Less staff and tools mean you need to have effective and well-tuned tools that return results with minimal effort. At LogRhythm, our goal is to… The post ...

Johnson Controls Ransomware Attack Could Impact DHS

DHS is reportedly investigating the impact of the recent Johnson Controls ransomware attack on its systems and facilities. The post Johnson Controls Ransomware Attack Could Impact DHS appeared first on SecurityWeek.

Critical vulnerability in WS_FTP Server exploited by attackers (CVE-2023-40044)

Progress Software, the company behind the recently hacked MOVEit file-sharing tool, has recently fixed two critical vulnerabilities (CVE-2023-40044, CVE-2023-42657) in WS_FTP Server, another popular secure file transfer solution. Proof-of-concept ...

Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks 

Patches are being developed for serious Exim vulnerabilities that could expose many mail servers to attacks.  The post Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks  appeared first on SecurityWeek.

McAfee’s AI technology strengthens privacy and identity protections for users

McAfee announced new AI protections and enhanced privacy and identity features as part of its latest product lineup. As McAfee continues to move beyond protecting individual devices to protecting people, McAfee’s newest portfolio of products ...

NIST supply chain security guidance for CI/CD environments: What you need to know

The National Institute of Standards and Technology's new proposed guidelines for integrating software supply chain security into CI/CD pipelines have arrived at an opportune time for security teams, with attacks on the software supply chain ...

Navigating the Nuances of the Asia-Pacific PDPA

Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage around the ...

CISA Kicks Off Cybersecurity Awareness Month With New Program

CISA has announced the Secure Our World cybersecurity awareness program, targeting both businesses and end users. The post CISA Kicks Off Cybersecurity Awareness Month With New Program appeared first on SecurityWeek.

Recently Patched TeamCity Vulnerability Exploited to Hack Servers

In-the-wild exploitation of a critical vulnerability in the TeamCity CI/CD server started shortly after a patch was released by developers. The post Recently Patched TeamCity Vulnerability Exploited to Hack Servers appeared first on SecurityWeek.

Most dual ransomware attacks occur within 48 hours

Since July 2023, the Federal Bureau of Investigation (FBI) has noticed a new trend: dual ransomware attacks on the same victim, occurring in close proximity of one another. Dual ransomware attacks Dual ransomware attacks are when against the same ...

Silverfort Open Sources Lateral Movement Detection Tool

Silverfort has released the source code for its lateral movement detection tool LATMA, to help identify and analyze intrusions. The post Silverfort Open Sources Lateral Movement Detection Tool appeared first on SecurityWeek.

Lazarus impersonated Meta recruiter to breach Spanish aerospace firm

Operators of the North Korea-linked Lazarus APT obtained initial access to the network of an aerospace company in Spain last year after a successful spearphishing campaign, by masquerading as a recruiter for Meta — the company behind Facebook, ...