Application Security News and Articles


LogRhythm and Novacoast join forces to identify and counteract malicious actors

LogRhythm announced its partnership with Novacoast, a cybersecurity, identity and access company specializing in managed security, engineering, development, and advisory services. This partnership marks a significant milestone as Novacoast ...

Alcion Raises $21 Million for Backup-as-a-Service Platform

Data management startup Alcion has raised $21 million in a Series A funding round led by Veeam to expand its market presence. The post Alcion Raises $21 Million for Backup-as-a-Service Platform appeared first on SecurityWeek.

Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android Devices

New versions of Pakistan-linked APT Transparent Tribe’s CapraRAT Android trojan mimic the appearance of YouTube. The post Pakistani APT Uses YouTube-Mimicking RAT to Spy on Android Devices appeared first on SecurityWeek.

OneTrust helps organizations manage the complexity of their trust programs

OneTrust unveiled innovations to help organizations manage the complexity of their trust programs, better understand their data to activate and use it, be more resilient against emerging threats, and unlock productivity when navigating ...

Pillars of Cloud Security

Applying on-premises security practices for cloud environments can create more risk. There are differences that must be considered. The post Pillars of Cloud Security appeared first on Security Boulevard.

Thousands of Juniper Appliances Vulnerable to New Exploit 

VulnCheck details a new fileless exploit targeting a recent Junos OS vulnerability that thousands of devices have not been patched against. The post Thousands of Juniper Appliances Vulnerable to New Exploit  appeared first on SecurityWeek.

Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products

Trend Micro has patched CVE-2023-41179, an Apex One zero-day code execution vulnerability that has been exploited in attacks.  The post Trend Micro Patches Exploited Zero-Day Vulnerability in Endpoint Security Products appeared first on ...

NIST CSF 2.0: What it means for modern software supply chain risk management

The latest draft of the cybersecurity framework proposed by the National Institute of Standards and Technology is receiving kudos from information security professionals. The post NIST CSF 2.0: What it means for modern software supply chain risk ...

NightDragon and CyberKnight strengthen cybersecurity in the Middle East, Turkey and Africa

NightDragon announced a new strategic partnership with CyberKnight to continue the international expansion capabilities of its portfolio companies and bring the latest CSSP innovations to customers in the Middle East, Turkey, Africa (META) and ...

Hacker Conversations: Casey Ellis, Hacker and Ringmaster at Bugcrowd

SecurityWeek interviews Casey Ellis, founder, chairman and CTO at Bugcrowd, best known for operating bug bounty programs for organizations. The post Hacker Conversations: Casey Ellis, Hacker and Ringmaster at Bugcrowd appeared first on SecurityWeek.

Chinese Hackers Target North American, APAC Firms in Web Skimmer Campaign

A Chinese threat actor has been observed targeting organizations in multiple industries to deploy web skimmers on online payment pages. The post Chinese Hackers Target North American, APAC Firms in Web Skimmer Campaign appeared first on SecurityWeek.

Egnyte simplifies AI deployment for customers in AEC industries

Egnyte announced vertical AI solutions for the Architecture, Engineering, and Construction (AEC) industries. The new solutions will simplify AI deployment and improve model accuracy for customers in AEC industries. Egnyte customers can use the ...

CISA Says Owl Labs Vulnerabilities Requiring Close Physical Range Exploited in Attacks

CISA says Owl Labs video conferencing device vulnerabilities that require the attacker to be in close range exploited in attacks The post CISA Says Owl Labs Vulnerabilities Requiring Close Physical Range Exploited in Attacks appeared first on ...

Cybersecurity M&A Roundup for First Half of September 2023

A dozen cybersecurity-related M&A deals were announced in the first half of September 2023. The post Cybersecurity M&A Roundup for First Half of September 2023 appeared first on SecurityWeek.

What is Fintech Risk and Compliance and How to Follow Regulations

Fintech Risk and compliance ensures fair lending practices, transparent disclosure of conditions, and availability of dispute resolutions. The post What is Fintech Risk and Compliance and How to Follow Regulations appeared first on Scytale. The ...

What is Continuous Threat Exposure Management (CTEM)?

Continuous Threat Exposure Management (CTEM) integrates threat intelligence situational awareness and automated response capabilities. The post What is Continuous Threat Exposure Management (CTEM)? appeared first on Security Boulevard.

Effective Measures to Enhance API Security

Have you ever thought about how API security is vital in 2023? Application Programming Interfaces (APIs) are crucial for facilitating communication across different software structures. They make it possible for packages to communicate and ...

Never use your master password as a password on other accounts

One in three Americans now use password managers, up from one in five in 2022, according to an online poll by Security.org that quizzed 1,051 American adults on how they use passwords and password managers. How users choose and use password ...

Balancing budget and system security: Approaches to risk tolerance

Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be a good ...

An inside look at NetSPI’s impressive Breach and Attack Simulation platform

In this Help Net Security interview, Scott Sutherland, VP of Research at NetSPI, delves into the intricacies of their Breach and Attack Simulation (BAS) platform and discusses how it offers unique features – from customizable procedures to ...