Application Security News and Articles


McAfee Scam Protection blocks fake emails, texts, and social media links

McAfee launched McAfee Scam Protection to address the rise in AI-generated phishing scams. The latest feature in McAfee’s product suite draws on patented AI technology to turn the tables on cybercriminals using AI to turbocharge scams and ...

NordVPN Sonar helps internet users detect phishing emails

NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the ...

Cyber Week 2023 & The Israel National Cyber Directorate Presents – Multifocal Privacy Compliance

Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National ...

Oracle Fusion Data Intelligence Platform enables users to achieve better business outcomes

Oracle announced the Fusion Data Intelligence Platform, a next-generation data, analytics, and AI platform that will help Oracle Fusion Cloud Applications customers achieve better business outcomes by combining data-driven insights with ...

You Just Bought Wiz, Here’s What’s Next

Reading Time: 5 minutes So you just bought or renewed with Wiz – well done on kicking off your cloud security journey. Cloud security is a multi-pronged program, requiring protection across workloads, platform configurations, cloud identities, ...

Introducing Kubescape 3.0

We are excited to announce the preview release of Kubescape 3.0, the next generation of the CNCF Kubernetes security posture management tool The post Introducing Kubescape 3.0 appeared first on ARMO. The post Introducing Kubescape 3.0 appeared ...

Legit Security raises $40 million to address AI’s threats to applications

Legit Security has successfully closed a $40 million venture capital round investment led by CRV with participation from existing investors Cyberstarts, Bessemer Venture Partners, and TCV. Legit Security’s ASPM platform continuously reduces ...

Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement

Finnish authorities have seized the drugs marketplace Piilopuoti, which has been operating on the Tor network since May 2022. The post Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement appeared first on SecurityWeek.

Staying on Topic in an Off Topic World

Learning how to keep discussions on-topic is an important skill for security professionals to learn, and it can allow them to continue to improve their security programs. The post Staying on Topic in an Off Topic World appeared first on SecurityWeek.

Cybellum launches Product Security Synergy Services

Cybellum launched new Product Security Synergy Services, augmenting its platform with a broad set of expert services, covering the entire product lifecycle. Device manufacturers and their suppliers, across all safety-critical industries, ...

Dig Security Adds Support for SaaS Apps to DSPM Platform

Dig Security added support for SaaS applications to its platform for protecting data stored in cloud computing environments. The post Dig Security Adds Support for SaaS Apps to DSPM Platform appeared first on Security Boulevard.

From GitHub Leak to Pwn: A Hacker’s Kill Chain

Discover how seemingly minor mistakes, like leaking a secret to a non-publicly accessible resource, can lead to a major breach. In this engaging scenario, see how an attacker would chain vulnerabilities to access highly sensitive areas, and learn ...

Akamai partners with Corero Network Security to improve DDoS protection for enterprises

Akamai announced a global partnership with Corero Network Security, the specialists in distributed denial-of-service (DDoS) protection solutions. Akamai is now offering Corero’s on-premises DDoS protection to extend Akamai Prolexic, ...

ServiceNow Strengthens Cybersecurity Controls

ServiceNow's Vancouver release of its Now software-as-a-service (SaaS) platform adds a range of cybersecurity capabilities. The post ServiceNow Strengthens Cybersecurity Controls appeared first on Security Boulevard.

Getting Started With Two-Factor Authentication (2FA)

Without two-factor authentication, you're putting your organization at risk. Here's how to get started implementing 2FA. The post Getting Started With Two-Factor Authentication (2FA) appeared first on Security Boulevard.

Hot Topics in Cyber Insurance

Cyber insurance has been available as an add-on or standalone business policy since the early 2000s. Organizations have been able to buy high-quality cyber insurance at a reasonable cost to offset the risks that businesses have faced as they’ve ...

Discern Security Emerges From Stealth Mode With $3 Million in Funding

Policy management cybersecurity startup Discern Security on Tuesday emerged from stealth mode with $3 million in funding. The post Discern Security Emerges From Stealth Mode With $3 Million in Funding appeared first on SecurityWeek.

Navigating the Digital Shadows: How Bad Actors Leverage Data Brokers to Target You

With the unprecedented surge in digital technology, data has become the lifeblood of the modern world. However, our increasing digital footprints have given rise to a burgeoning industry known as data brokerage, which has become a playground for ...

DHS Publishes New Recommendations on Cyber Incident Reporting

DHS has published a new set of recommendations to help federal agencies better report cyber incidents and protect critical infrastructure. The post DHS Publishes New Recommendations on Cyber Incident Reporting appeared first on SecurityWeek.

Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems

Atos Unify product vulnerabilities could be exploited to cause disruption and reconfigure or backdoor the targeted system.  The post Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems appeared first on SecurityWeek.