Application Security News and Articles


LLM Guard: Open-source toolkit for securing Large Language Models

LLM Guard is a toolkit designed to fortify the security of Large Language Models (LLMs). It is designed for easy integration and deployment in production environments. It provides extensive evaluators for both inputs and outputs of LLMs, offering ...

Avoiding domain security risks when taking your business online

Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should ...

Companies still don’t know how to handle generative AI risks

Energized by the hype around generative AI, enterprises are aggressively pursuing practical applications of this new technology while remaining cautious about the risks, according to ISG. ISG research shows 85% of companies surveyed believe ...

Organizations are racing against time to meet the PCI DSS 4.0 deadline

Payment data security concerns remain widespread as organizations undertake significant lift to meet the PCI DSS 4.0 deadline, according to Bluefin. 94% of survey respondents said they have significant or very significant concerns pertaining to ...

Who’s Behind the 8Base Ransomware Website?

The victim shaming website operated by the cybercriminals behind 8Base -- currently one of the more active ransomware groups -- was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made ...

Automated Vulnerability Detection: Mitigate Fraud and Strengthen Your Cybersecurity Defense

Don't let cybercriminals exploit your weaknesses. Empower your cybersecurity defense with automated vulnerability detection and mitigate fraud effectively. The post Automated Vulnerability Detection: Mitigate Fraud and Strengthen Your ...

A New CINOSHI Cryptocurrency Stealing Malicious Software Spotted in the Wild

I just came across to a newly released cryptocurrency stealing malicious software as a service cybercrime ecosystem proposition which has a lot of cryptocurrency and related accounting data stealing capabilities.   Sample screenshots: Sample ...

A New Kristina CS DIY Ransomware Spotted in the Wild

I just came across to a new DIY ransomware offered within the cybercrime ecosystem. Priced at $2,500 it also offers something I haven't seen in a while in specific for a ransomware cybercrime ecosystem proposition namely its self-propagating ...

A New DIY Grim Android Botnet Spotted in the Wild

I just came across to a newly released DIY Android Botnet with some pretty interesting built-in features including the use of mobile-based ransomware device locking capability including to offer the attacker the capability to take full control of ...

Real World Impact of Medical Device Security

TechSpective Podcast Episode 116   Getting hacked sucks in all scenarios. In most cases, though, getting hacked is an inconvenience. In some cases, it is deadly. Having your data stolen, or getting your computer bricked by ransomware is ...

Uplevel to Next-Generation Vulnerability Management with our CISO Guide

Vulnerability management is difficult and not getting any easier. CISOs and security teams struggle to keep their organizations safe from cyber security threats that come from software flaws. A big part of the challenge is the growing number of ...

Group Allegedly Behind MGM, Caesars Attacks is Fairly New to Ransomware

The threat group that claims to have been involved in the high-profile attacks earlier this month on casino operators MGM Resorts and Caesars Entertainment has evolved in recent months from stealing credentials and accessing systems to ...

The Growing Importance of Security Assurance (And What It Means to Be Good at Compliance Operations)

Living through a global pandemic has made life tough for every human on the planet—some far more than others. We saw unprecedented losses in lives, jobs, and education in the past year. In the realm of security assurance, information security, ...

Guide to IoT in 2023: What’s New and Why It Matters?

The Dawn of IoT: A Revolution in the Digital World In today’s interconnected world, the Guide to IoT is more than just a primer; it’s a roadmap to understanding the digital revolution unfolding before our eyes. The Internet of Things, ...

If the worst happens: How to prep your accounts so your loved one can get into them

It’s not fun to think about: But if you should unexpectedly die, could your spouse, partner, children or other loved ones access your bank accounts, online credit card portals, retirement accounts, and social media accounts?   The post If the ...

Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages

Exposed data includes backup of employees workstations, secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages. The post Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages ...

Modernized Financial Cards for the Next Generation of Payments

Financial cards have been a cornerstone of our monetary transactions for decades, providing us with... The post Modernized Financial Cards for the Next Generation of Payments appeared first on Entrust Blog. The post Modernized Financial Cards for ...

SentiLink unveils Facets to improve financial fraud detection

SentiLink launched Facets, a new intelligent attributes solution that enables U.S. financial institutions to improve fraud models and implement more sophisticated onboarding flows. The solution provides feature-specific intelligence derived from ...

An Enterprise Action Plan For CDR

By David NeumanSenior Analyst, TAG Cyber dneuman@tag-cyber.com Introduction   Information is the lifeblood of 21st-century businesses. They depend on the ability to safely and securely collect, collaborate, share, and use information as part ...

Venafi Control Plane enhancements help enterprises manage machine identities of all kinds

Venafi launched a suite of innovations within its Control Plane for Machine Identities. These innovations expand Venafi’s software-as-a-service (SaaS) machine identity management platform, equipping security and platform teams to accelerate ...