Application Security News and Articles


A New Approach to Defending Network Infrastructure from Ransomware Groups and APTs

Remember when ransomware was simply getting locked out of your files? Those seem like the good old days compared to today’s nightmare, with entire operations shut down for days or weeks.  While security teams have improved their defenses ...

CJIS Security Awareness Training Cheat Sheet

Who’s the last organization you’d expect to be a cyberattack victim? If you answered law enforcement, you’d be correct—but the problem is, it’s happening right now. Police and law enforcement agencies are under cyber assault, and these ...

Global events fuel DDoS attack campaigns

Cybercriminals launched approximately 7.9 million DDoS attacks in 1H 2023, representing a 31% year-over-year increase, according to NETSCOUT. Global events like the Russia-Ukraine war and NATO bids have driven recent DDoS attack growth. Finland ...

What Does Zero Trust Mean in Data Security?

Almost every heist movie has a sequence where elaborate plans are created to get the plotters past the heavily guarded perimeter of their target facility. Then, once they’re inside, they drop their disguises and walk around like they own the ...

Online fraud can cost you more than money

Online fraud is a pervasive and constantly evolving threat that affects individuals and organizations worldwide. Online fraudsters often leverage the anonymity and convenience of the internet to exploit vulnerabilities, manipulate victims, and ...

Infosec products of the month: September 2023

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armis, AlphaSOC, Baffle, Ciphertex Data Security, Cisco, ComplyCube, CTERA, CyberSaint, Dig Security, Fortinet, Ghost Security, ...

Evaluating AppSec solutions: from theory to practice

How to benchmark properly your *AST toolsContinue reading on Medium »

DEF CON 31 – Andrew Brandt’s ‘War Stories – You’re Not George Clooney, And This Isn’t Oceans 11’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. ...

Choosing the Right Cybersecurity Awareness Training Solution: Your Ultimate Checklist

Email-based attacks spiked almost 500% in the first half of 2023, making phishing the most popular form of cyberattack for opportunistic hackers. There’s no doubt that onboarding a cybersecurity awareness training solution has become a modern ...

Week in review: Chrome zero-day is actually in libwebp, Sony hacking rumours

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How global enterprises navigate the complex world of data privacy In this Help Net Security interview, Evelyn de Souza, Head of Privacy ...

Google Chrome Heap Buffer Overflow Vulnerability (CVE-2023-5217) Notification

Overview Recently, NSFOCUS CERT found that Google officially fixed a zero-day exploit (CVE-2023-5217), which was caused by the heap buffer overflow in the VP8 encoding of the open source libvpx video codec library. An attacker could use this ...

A Closer Look at the Snatch Data Ransom Group

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang's internal operations. Today, we'll take a closer look at the history of Snatch, its alleged ...

Discover Endpoint VPN in 2023: Unlocking Secure Remote Access

Introduction Introduction In today’s interconnected world, the need for secure remote access to networks and data has never been more crucial. As we navigate the complexities of remote work, especially in the ever-evolving landscape of 2023, ...

DEF CON 31 – Lorenzo Cococcia ‘s ‘War Stories – Finding Foes And Yourself With Latency Trilateration’

Many thanks to DEF CON 31 for publishing their presenter’s tremendous DefCon Conference 31 Presenters Content at Caesars Forum, Fllamingo, Harrah’s and Linq in Las Vegas, Nevada via the organizations YouTube channel. Permalink The post DEF ...

2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs

Welcome to the 11th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API10:2023 Unsafe Consumption of APIs. In this series we are taking an ...

What Enterprise Security Teams Expect from Case Management Solutions

A less-talked about challenge in cybersecurity is managing multiple alert queues. While the volume of alerts is acknowledged as an issue, an important step toward simplifying day-to-day life for security analysts is to consolidate alerts into a ...

Bankrupt IronNet Shuts Down Operations

Bankrupt and out of financing options, IronNet has terminated all employees and plan to file for Chapter 7 protection. The post Bankrupt IronNet Shuts Down Operations appeared first on SecurityWeek.

ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

Once again, politicians are playing political football, threatening a fourth partial government shutdown in a decade. Related: Biden’s cybersecurity strategy As this political theater runs its course one of the many things at risk is national ...

Meraki Chooses Ordr as Ecosystem Partner of the Month!

We’ve always known the value of partnering with Cisco Meraki. Recently we learned that we were selected by the Meraki team as the September 2023 Ecosystem Partner of the Month. This is a great honor for all of us at Ordr, we’re thrilled by ...