Application Security News and Articles


Shuffle Automation: Open-source security automation platform

Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. It’s designed to integrate with Managed Security Service Providers ...

Cyber insurance 2.0: The systemic changes required for future security

Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at ...

Ad-injecting malware posing as DwAdsafe ad blocker uses Microsoft-signed driver

ESET Research has discovered a sophisticated Chinese browser injector: a signed, vulnerable, ad-injecting driver from a mysterious Chinese company. This threat, which ESET dubbed HotPage, comes self-contained in an executable file that installs ...

Enhancing Code Security with GitGuardian and GGShield

In today’s software development landscape, securing code repositories against leaks and vulnerabilities is paramount. Tools like…Continue reading on Medium »

USENIX Security ’23 – How Fast Do You Heal? A Taxonomy For Post-Compromise Security In Secure-Channel Establishment

Authors/Presenters:Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to ...

The Critique of Pure Reason: Understanding Cyber Security Epistemology Through Kantian Philosophy

Immanuel Kant’s The Critique of Pure Reason delves deeply into the nature and limits of human knowledge, offering profound insights that can be applied to various fields – now including cyber security. Kant’s philosophy emphasizes the ...

Week in review: CrowdStrike update causes widespread IT outage, critical Splunk Enterprise flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Faulty CrowdStrike update takes out Windows machines worldwide Thousands and possibly millions of Windows computers and servers worldwide have ...

USENIX Security ’23 – Hash Gone Bad: Automated Discovery Of Protocol Attacks That Exploit Hash Function Weaknesses

**Distinguished Paper Award Winner** Authors/Presenters:Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s ...

Several Linux Kernel Azure Vulnerabilities Fixed in Ubuntu

Recently, Canonical released security updates to address several vulnerabilities in the Linux kernel for Microsoft Azure Cloud systems in Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. An attacker could possibly use these issues to cause a denial of ...

Happy Birthday, LoginRadius: One Year Away from the Big Teen Milestone!

As LoginRadius celebrates its 12th anniversary, we reflect on a year filled with significant milestones and innovations. From groundbreaking features like Push Notification MFA and Passkeys to impactful CSR initiatives, we continue to set new ...

Judge Dismisses Most SEC Charges Against SolarWinds

A federal district court judge blew a hole in the SEC's case against SolarWinds, saying that while the company and its CISO could be tried for statements made before the high-profile Sunburst attack, those that came after were based on ...

Blue Screened: Microsoft Windows Computers Crashed by Automated CrowdStrike Update

What happened? Today, a significant global IT outage is broadly affecting diverse industries including aviation, banking, medical, technology, retail, and media due to a faulty content update published by security vendor CrowdStrike. Worldwide, ...

Future-Proofing Cities: LYT’s Story

As cities expand with smart technologies to enhance infrastructure, robust cybersecurity is crucial. Discover how continuous assessments with NodeZero keep urban operations safe and efficient. The post Future-Proofing Cities: LYT’s Story ...

Understanding Your IT Dependencies: Unpacking the Crowdstrike Windows Outage

Happy almost weekend, everybody…or, not, if you’re in IT…or trying to travel…or get medical attention…or just get your work done and start the weekend off with a bang… Many of us have woken up to the news of a massive global outage ...

Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity

  The world experienced a digital pandemic of systems going offline and displaying the dreaded Windows Blue Screen of Death (BSOD), due to a catastrophic failure caused by a flawed file in an update to CrowdStrike cybersecurity customers. The ...

USENIX Security ’23 – A Comprehensive, Formal And Automated Analysis Of The EDHOC Protocol

Authors/Presenters:Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. ...

On Entrust? Imperva has your back!

Managing SSL/TLS certificates is a critical yet complex task for any organization. Certificates ensure secure communication between users and your web applications, but maintaining them involves constant vigilance and expertise. From monitoring ...

Talking DSPM: Episode 1 – Brian Castagna

https://www.youtube.com/watch?v=cGVh8tjCncg Q: Welcome Brian. We’re excited to have you join us and share your views on modern data+AI security. Can... The post Talking DSPM: Episode 1 – Brian Castagna appeared first on Symmetry Systems. The ...

Security of Custom GitHub Actions

Get details on Legit's research on the security of custom GitHub Actions. The post Security of Custom GitHub Actions appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Beam of Light’

via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Beam of Light’ appeared first on Security Boulevard.