Application Security News and Articles


How to track WooCommerce customer history

Tracking WooCommerce customer history and other useful information has a lot of benefits. Not only can it help you grow your business, but it can also help you comply with regulations such as GDPR, hold users accountable for their actions and ...

Are Bots Behind the Booming iPhone 15 Pre-Orders?

Kasada has observed adversaries using various bots to successfully place thousands of iPhone 15 pre-orders, including the iPhone 15 Pro Max. The post Are Bots Behind the Booming iPhone 15 Pre-Orders? appeared first on Security Boulevard.

Misconfigured TeslaMate Instances Put Tesla Car Owners at Risk

Attackers can find tons of information on Tesla cars and their drivers by searching for misconfigured TeslaMate instances online. The post Misconfigured TeslaMate Instances Put Tesla Car Owners at Risk appeared first on SecurityWeek.

How to Perform an ISO 27001 Risk Assessment

A risk assessment is a critical part of the ISO 27001 process. And for obvious reasons. The post How to Perform an ISO 27001 Risk Assessment appeared first on Scytale. The post How to Perform an ISO 27001 Risk Assessment appeared first on ...

stackArmor ATO for AI accelerates safe AI adoption for public sector organizations

stackArmor announced its Approval To Operate (ATO) for AI accelerator, that helps public sector and government organizations rapidly implement security and governance controls to manage risks associated with Generative AI and General AI Systems. ...

Firefox 118 Patches High-Severity Vulnerabilities

Firefox 118 patches six high-severity vulnerabilities, including a memory leak potentially leading to sandbox escape. The post Firefox 118 Patches High-Severity Vulnerabilities appeared first on SecurityWeek.

Stolen GitHub Credentials Used to Push Fake Dependabot Commits

Threat actors have been using stolen GitHub personal access tokens to push malicious code posing as Dependabot contributions. The post Stolen GitHub Credentials Used to Push Fake Dependabot Commits appeared first on SecurityWeek.

CISO Global Launches Channel Program to Extend Reach Through Value Added Resellers, Managed Service Providers, and Strategic Partners

Global cybersecurity provider to offer three levels of engagement to aid partners in supporting their end-user clients Scottsdale, Ariz. September 27, 2023 – CISO Global (NASDAQ: CISO), an industry leader as a managed cybersecurity and ...

New twist on ZeroFont phishing technique spotted in the wild

Cybercriminals are leveraging the ZeroFont technique to trick users into trusting phishing emails, SANS ISC handler Jan Kopriva has warned. The ZeroFont phishing attack Documented and named by Avanan in 2018, the ZeroFont technique involves using ...

TrustCloud Business Intelligence Dashboards Empower CISOs to Present Financial Impact of Risk, Security, and Compliance Program to Board of Directors

TrustCloud Business Intelligence helps GRC and Security professionals track and share how their trust program adds efficiency, reduces financial liability and risk, improves security, and drives revenue growth—proving to business leaders that ...

Google Open Sources Binary File Comparison Tool BinDiff

Google has released the source code of BinDiff, a binary file comparison tool popular within the security research community, on GitHub. The post Google Open Sources Binary File Comparison Tool BinDiff appeared first on SecurityWeek.

Decoding Digital Threats: How Bad Actors Leverage Data Brokers to Access Your Personal Information

A question that frequently crosses our minds in this digitally-driven world is: “How do cybercriminals get hold of our personal information?” Your digital life intertwines with countless platforms, each housing fragments of your data, which ...

Let’s Get Real: The Importance of Remediation in MDR

In the fast-paced world of cybersecurity, where threats loom around every digital corner and arrive in “Zero-Days”, Managed Detection and Response (MDR) services The post Let’s Get Real: The Importance of Remediation in MDR appeared first ...

Malicious Actors Exploiting AI Chatbot Jailbreaking Tips

Cybercriminals are sharing trade secrets online to help others jailbreak AI chatbots like ChatGPT. The post Malicious Actors Exploiting AI Chatbot Jailbreaking Tips appeared first on Security Boulevard.

Appdome unveils mobile anti-malware protections

Appdome announced new mobile anti-malware protections that detect Android Accessibility Service Malware such as Xenomorph, Brasdex, Octo, Sharkbot, Flubot, TeaBot, PixPirate, Sova, Spynote, Joker and more. These malware are used to carry out ...

macOS 14 Sonoma Patches 60 Vulnerabilities

macOS 14 Sonoma has been officially released by Apple and the latest version of the operating system patches over 60 vulnerabilities. The post macOS 14 Sonoma Patches 60 Vulnerabilities appeared first on SecurityWeek.

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)

The Chrome zero-day exploited in the wild and patched by Google a few weeks ago has a new ID (CVE-2023-5129) and a description that tells the whole story: the vulnerability is not in Chrome, but the libwebp library, which is used by many popular ...

Integrating WireGuard with Active Directory: Bridging the Gap

Integrating WireGuard with Active Directory: Bridging the Gap WireGuard is rapidly becoming the go-to VPN protocol of many due to its speed, simplicity, and strong encryption. However, as enterprises migrate or consider migrating to WireGuard, ...

OneTrust AI Governance helps organizations manage AI systems and mitigate risk

OneTrust announces OneTrust AI Governance is now available on the Trust Intelligence Platform. OneTrust AI Governance enables visibility and transparency in adopting and governing AI use throughout the organization so companies can manage AI ...

TeamViewer and Ivanti simplify the complex task of managing and securing remote devices

TeamViewer announced they are teaming with Ivanti, the tech company that elevates and secures Everywhere Work. This collaboration will leverage Ivanti’s mobile device management capabilities (Ivanti Neurons for MDM) to enhance ...