Application Security News and Articles


Types of Adversarial ML Attacks and How To Overcome Them

Machine learning-powered algorithms are susceptible to a variety of adversarial attacks that aim to degrade their performance. The post Types of Adversarial ML Attacks and How To Overcome Them appeared first on Security Boulevard.

Apple issues patches to address vulnerabilities; Malware targets Android devices

Data breaches may ultimately be out of your control, as you have to hope the organizations holding your personal data have the proper security measures in place to protect your information. However, there are cyber threats you can protect ...

Norton Small Business offers protection against scams and phishing threats

Norton announced Norton Small Business, the all-in-one cybersecurity solution to help entrepreneurs and small business owners protect their financial futures. While nearly 90% of businesses globally are small businesses – 99.9% in the US ...

Y Combinator’s Summer 2023 Cybersecurity, Privacy, and Trust Startups

Analyzing opportunities and challenges for the 10 cybersecurity, privacy, and trust startups in Y Combinator's Summer 2023 batch. The post Y Combinator’s Summer 2023 Cybersecurity, Privacy, and Trust Startups appeared first on Security ...

Panzura Edge minimizes the risk of data leakage and exfiltration

Panzura announced Panzura Edge gateway, allowing organizations to create private workspaces and securely share and update files stored within Panzura’s Cloud File System (CloudFS). Employees and trusted partners, inside and outside the ...

Perks of Hiring Top 3% of CloudOps Engineers from PeoplActive

To oversee, monitor, and enhance the usability, security, and accessibility of cloud-based infrastructure, apps, and services, “CloudOps” processes, tools, and approaches are utilized. For example, it offers advice and best practices for ...

Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)

Google has fixed another critical zero-day vulnerability (CVE-2023-5217) in Chrome that is being exploited in the wild. About CVE-2023-5217 The vulnerability is caused by a heap buffer overflow in vp8 encoding in libvpx – a video codec ...

Cisco Warns of IOS Software Zero-Day Exploitation Attempts

Cisco has released patches for vulnerability in the GET VPN feature of IOS and IOS XE software that has been exploited in attacks. The post Cisco Warns of IOS Software Zero-Day Exploitation Attempts appeared first on SecurityWeek.

Identifying and Addressing Internal Control Weaknesses

What are Internal Controls? Internal controls can be understood with 4 words that start with the letter ‘P’. They are the protocols, policies, processes, and practices established within an organization to ensure the reliability of ...

Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits

Russian zero-day acquisition firm Operation Zero is now offering $20 million for full Android and iOS exploit chains. The post Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits appeared first on SecurityWeek.

Does Social Media Cause Cyberbullying And Depression?

The start of the academic year is a moment of opportunity — not just for kids, but for their school districts, too. And, in the spirit of continuous improvement, many schools are setting their sights on student mental health. In this guide, ...

PingSafe unveils MSSP partnership with Human Managed

PingSafe has unveiled a strategic partnership with Human Managed, providing data-driven and evidence-based security findings to improve the security posture of their extended customer base. Available now in Human Managed’s flagship Intelligence ...

What we know about BlackCat and the MGM hack

More than a week after it suffered a crippling ransomware attack, the hotel giant MGM is struggling to recover. The attack, linked to the ransomware-as-a-service (RaaS) group known as ALPHV, or BlackCat, caused slot machines and ATMs in MGM’s ...

Sysdig Launches Realtime Attack Graph for Cloud Environments

Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning. The post Sysdig Launches Realtime Attack Graph for Cloud Environments ...

What We Can Learn from Penn State’s Compliance Conundrum 

Author: Randy Griffith, Senior Security Consultant, CISO Global Penn State University is in hot water again for legal and compliance violations. This time, the activities in question are related to the university’s claim to be compliant under ...

Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor

Google has rushed to patch a new Chrome zero-day vulnerability, tracked as CVE-2023-5217 and exploited by a spyware vendor.  The post Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor appeared first on SecurityWeek.

Journey partners with Webex by Cisco to enhance security for customer interactions

Journey announced its partnership with Webex by Cisco to streamline customer experience and enhance security for businesses that utilize Webex Contact Center. Journey’s integrated identify platform is now available to all Webex Contact ...

AICPA SOC 2 Compliance: A Milestone for SternX Technology

SternX Technology achieves AICPA SOC 2 compliance, ensuring the security, integrity, confidentiality, and privacy of their systems and data. The post AICPA SOC 2 Compliance: A Milestone for SternX Technology appeared first on SternX ...

DORA EU

What is DORA (EU)? The DORA Regulation (No. 2022/2554), known as the Digital Operational Resilience Act, is an important EU law about cybersecurity for financial institutions like banks or credit institutions. More than just having security for ...

How to avoid the 4 main pitfalls of cloud identity management

Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, determine and understand who can take what actions, and on top of it all ...