Application Security News and Articles


Appdome unveils mobile anti-malware protections

Appdome announced new mobile anti-malware protections that detect Android Accessibility Service Malware such as Xenomorph, Brasdex, Octo, Sharkbot, Flubot, TeaBot, PixPirate, Sova, Spynote, Joker and more. These malware are used to carry out ...

macOS 14 Sonoma Patches 60 Vulnerabilities

macOS 14 Sonoma has been officially released by Apple and the latest version of the operating system patches over 60 vulnerabilities. The post macOS 14 Sonoma Patches 60 Vulnerabilities appeared first on SecurityWeek.

Google “confirms” that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)

The Chrome zero-day exploited in the wild and patched by Google a few weeks ago has a new ID (CVE-2023-5129) and a description that tells the whole story: the vulnerability is not in Chrome, but the libwebp library, which is used by many popular ...

Integrating WireGuard with Active Directory: Bridging the Gap

Integrating WireGuard with Active Directory: Bridging the Gap WireGuard is rapidly becoming the go-to VPN protocol of many due to its speed, simplicity, and strong encryption. However, as enterprises migrate or consider migrating to WireGuard, ...

OneTrust AI Governance helps organizations manage AI systems and mitigate risk

OneTrust announces OneTrust AI Governance is now available on the Trust Intelligence Platform. OneTrust AI Governance enables visibility and transparency in adopting and governing AI use throughout the organization so companies can manage AI ...

TeamViewer and Ivanti simplify the complex task of managing and securing remote devices

TeamViewer announced they are teaming with Ivanti, the tech company that elevates and secures Everywhere Work. This collaboration will leverage Ivanti’s mobile device management capabilities (Ivanti Neurons for MDM) to enhance ...

Fake Bitwarden installation packages delivered RAT to Windows users

Windows users looking to install the Bitwarden password manager may have inadvertently installed a remote access trojan (RAT). The ZenRAT malware A malicious website spoofing Bitwarden’s legitimate one (located at bitwariden[.]com) has been ...

New GPU Side-Channel Attack Allows Malicious Websites to Steal Data

GPUs from AMD, Apple, Arm, Intel, Nvidia and Qualcomm are vulnerable to a new type of side-channel attack named GPU.zip. The post New GPU Side-Channel Attack Allows Malicious Websites to Steal Data appeared first on SecurityWeek.

Building Custom Scenarios with CNAPPgoat

You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills The post Building Custom Scenarios with CNAPPgoat appeared first on Ermetic. The post Building Custom Scenarios with CNAPPgoat ...

Export Disassembly Code using Radare2

Radare2 is an open-source reversing framework. It combines multiple tools to help analyze a binary.Continue reading on Medium »

BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity

There’s a tiny bit more to Cisco’s acquisition of Splunk than just a lumbering hardware giant striving to secure a firmer foothold in the software business. Related: Why ‘observability’ is rising to the fore Cisco CEO Chuck Robbins has ...

High number of security flaws found in EMEA-developed apps

Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions analysed, EMEA also has the highest percentage of ...

The pitfalls of neglecting security ownership at the design stage

For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond the IT and network access aspects. In this Help Net ...

Is your identity safe? Exploring the gaps in threat protection

A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations that can lead to the ...

Network Flight Simulator: Open-source adversary simulation tool

Network Flight Simulator is a lightweight utility that generates malicious network traffic and helps security teams evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to ...

Cloud service inefficiencies drain IT budgets

71% of IT professionals stated that cloud-related costs make up 30% or more of their total IT spend, according to Aptum. In the current demanding economic environment, organizations are becoming increasingly aware of the financial implications of ...

Guide: SaaS Offboarding Checklist

Download this template from Nudge Security for the essential steps of IT offboarding in the age of SaaS. This employee offboarding checklist covers the murky territory of offboarding SaaS access for departing employees—a land of common pitfalls ...

What Exactly Is Application Security Posture Management?

For security leaders looking for a more modern approach to improve their application security posture and better manage enterprise risk, enter application security posture management, or ASPM. “Application security posture management analyzes ...

My Journey ‘Working From Anywhere’ at Kasada

Kasada's 'work from anywhere' policy gave me the personal autonomy and flexibility I needed when it mattered most. The post My Journey ‘Working From Anywhere’ at Kasada appeared first on Security Boulevard.

Xenomorph Android Banking Trojan Makes Landfall in US

A sophisticated Android banking trojan that was first seen last year targeting banking apps in several European countries has made its way across the Atlantic Ocean, looking to steal credentials and money from customers of such U.S. financial ...