Application Security News and Articles


Financial crime compliance costs exceed $206 billion

The growing complexity of compliance regulations and ever-evolving criminal methodologies are a major difficulty for financial institutions, according to LexisNexis Risk Solutions. Global financial crime compliance costs for financial ...

Security Spotlight: Monitoring Users Opening Malicious Files

The ‘Security Spotlight’ series of blogs is written in accompaniment with the YouTube series of the same name, which is aimed at providing quick visibility and understanding into how you can leverage the LogRhythm platform against a variety ...

Why California’s Delete Act matters for the whole country

The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data brokers. In this Help Net Security video, Dr. Chris Pierson, CEO of ...

Cybersecurity budgets show moderate growth

Despite the economic uncertainty and inflation, security budgets generally continued to rise but at a lower rate than prior years, according to new research from IANS and Artico Search. Security budgets increase by 6% in 2023 Respondents reported ...

US State Department Says 60,000 Emails Taken in Alleged Chinese Hack

The US State Department said that hackers took around 60,000 emails in an attack which Microsoft has blamed on China. The post US State Department Says 60,000 Emails Taken in Alleged Chinese Hack appeared first on SecurityWeek.

What You Need to Know About the libwebp Exploit

libwebp exploit timeline CVE-2023-41064; CVE-2023-4863; CVE-2023-5129 On September 7th 2023, researchers at Citizen Lab reported a zero-click exploit that was actively used by NSOs to infect iOS devices with the Pegasus malware – this was ...

Why Ordr? Why Now?

I just joined Ordr as Chief Healthcare Officer and, as is often the case in life, there’s a story, personal and professional, behind my new adventure here.  A little more than seven years ago, while I was CTO at Sutter Health, a friend from my ...

Build for Detection Engineering, and Alerting Will Improve (Part 3)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. In this blog (#3 in the series), we will start to define and refine our detection engineering machinery ...

Vulnerability Assessment: A Guide

Performing a vulnerability assessment is the first step towards securing your organization. We breakdown what you need to know and where to start. The post Vulnerability Assessment: A Guide appeared first on Mend. The post Vulnerability ...

Aligning Compliance Standards with DevOps Methodologies: An Engineer’s Roadmap

DevOps and Compliance Building compliant workloads cannot be an afterthought in the rapidly evolving landscape of DevOps, where continuous integration, delivery,... Read more » The post Aligning Compliance Standards with DevOps Methodologies: An ...

Crocs enhances customer journey and safeguards revenue growth with Kasada

Bots are used to purchase and resell valuable products — sneakers, clothing, electronics, and more — along with many forms of account and checkout fraud. The post Crocs enhances customer journey and safeguards revenue growth with Kasada ...

Threat Spotlight: The Dark Web and AI

Executive Overview More than 200,000 credentials to AI language models are currently being sold on the dark web as part of stealer logs, files containing thousands of credentials derived from infostealer malware. This certainly raises the risk ...

Lawsuit Filed Against Google, Meta, H&R Block for Sharing Taxpayer Data

Meta, Google, and giant tax preparer H&R Block are being accused of conspiring to illegally use spyware from the tech giants to collect and share tax return information from hundreds of taxpayers that could be used to generate targeted online ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Red Alert – Europe Israel Cyber Security Summit

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Sidecar Containers in Kubernetes: A Personal Journey

I had always wanted to use sidecars with Istio or Splunk forwarder in production, but as a Kubernetes The post Sidecar Containers in Kubernetes: A Personal Journey appeared first on ARMO. The post Sidecar Containers in Kubernetes: A Personal ...

Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product 

Progress Software ships patches for critical-severity flaws in its WS_FTP file transfer software and warns that a pre-authenticated attacker could wreak havoc on the underlying operating system. The post Progress Software Patches Critical ...

Unlocking Endpoint Security as a Service: 2023 Insights!

Introduction In the evolving landscape of cyber threats, small businesses find themselves in the crosshairs, necessitating robust and dynamic security solutions. Endpoint Security and Cyber Security as a Service (SECaaS) emerge as pivotal ...

The Ultimate Guide to Enterprise Risk Management Strategy

Enterprise risk management is a nebulous, hard-to-define topic area. It encompasses a large variety of risks and procedures for the enterprise and it differs greatly from traditional risk management.  So, what exactly is enterprise risk ...

Third-Party Risk Management: Best Practices for Protecting Your Business

At this time, nearly every business outsources some aspect of its operations. But it’s becoming increasingly tricky for organizations to ensure that third-party providers remain a source of strength for their business — not a weak link. ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #260 — Misleading Indicators

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...