Application Security News and Articles


Concordium Web3 ID prioritizes user privacy for both individuals and businesses

Concordium unveils Web3 ID: an edge identification platform offering age-verification capacities designed to prioritize user privacy for both individuals and businesses. Concordium’s age verification tooling works to protect minors online ...

Cyberattacks Increasingly Target APIs

Nearly three-quarters of organizations suffered three or more breaches involving APIs in past two years. The post Cyberattacks Increasingly Target APIs appeared first on Security Boulevard.

Deduce Raises $9 Million to Fight AI-Generated Identity Fraud

Deduce has raised $9 million in a new funding round led by Freestyle Capital, to launch its AI-generated identity fraud prevention platform. The post Deduce Raises $9 Million to Fight AI-Generated Identity Fraud appeared first on SecurityWeek.

MGM Hackers Broadening Targets, Monetization Strategies

The financially motivated UNC3944 group that hacked MGM has hit at least 100 organizations, mainly in the US and Canada. The post MGM Hackers Broadening Targets, Monetization Strategies appeared first on SecurityWeek.

Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks 

A recently introduced Google account sync feature has been blamed after sophisticated hackers attacked 27 cryptocurrency firms via Retool. The post Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks  appeared first on ...

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample ...

Feature Adaptations on Slave ADSM in a High Availability Environment

Sometimes, to ensure continuous business operations in the event of equipment failure, it is a common practice to configure High Availability (HA) using two ADSM devices. You can configure High Availability (HA) in ADSM by navigating to ...

Building a DevOps Dream Team: The Ideal Structure and Roles

Software development using DevOps combines two significant market developments. Agile infrastructure is the first trend, which incorporates lean and agile principles into normal company operations. The second trend emphasizes how crucial it is ...

Adobe Acrobat and Reader Arbitrary Code Execution Vulnerability (CVE-2023-26369) Notification

Overview Recently, NSFOCUS CERT monitored Adobe’s official security announcement and fixed an arbitrary code execution vulnerability (CVE-2023-26369). Due to a cross-border write flaw, an unauthenticated attacker could finally execute arbitrary ...

Microsoft Septemer Security Updates for Multiple High-Risk Product Vulnerabilities

Overview On September 13, NSFOCUS CERT found that Microsoft had released a security update patch for September, fixing 61 security issues, involving Microsoft SharePoint Server, Visual Studio, Internet Connection Sharing (ICS), Microsoft Azure ...

Modernizing fraud prevention with machine learning

The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and more opportunistic, there’s an ...

Will Cyber Threats Result in Decline of Fintech Industry?

The Fintech industry has emerged as an essential factor in the digital age. The revolutionized way of handling finances comes out to be necessary with emerging cyber risks in Fintech industries. The rapid development has made it a prime target ...

New infosec products of the week: September 15, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Armis, Cisco, CTERA, Kingston Digital, Purism, and Swissbit. Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS Purism ...

Enterprises persist with outdated authentication strategies

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations ...

Cybersecurity risks dampen corporate enthusiasm for tech investments

64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according to a report by HPE Aruba Networking. This is perhaps unsurprising as 91% either consider ...

Generative AI lures DevOps and SecOps into risky territory

Application security leaders are more optimistic than developer leaders on generative AI, though both agree it will lead to more pervasive security vulnerabilities in software development, according to Sonatype. According to the surveyed DevOps ...

Employer Obligations on Employee Data Under Indian Law

UPDATE: The Personal Data Protection Bill 2019 has been withdrawn by the Indian government after over three years of discussion. The Bill had attracted major criticisms from industry stakeholders, NGOs, privacy activists and tech platforms as it ...

Securing OTA with Harman International’s Michal Geva

The once far-off vision of remotely updating software without needing to bring it into a service center was initially designed for bug fixes and cybersecurity updates. Today, over-the-air updates (OTA) are used to activate new functionality and ...

The Details of Microsoft’s September 2023 Patch Tuesday Release

On September 12th, 2023, Microsoft released their September Patch Tuesday and revealed 59 Microsoft CVEs; 47 of them are HIGH severity and 12 of them are MEDIUM severity, along with 7 other non-Microsoft CVEs.  CVE-2023-36802 and CVE-2023-36761 ...

BSides Buffalo 2023 – Magno Logan – Hacking GitHub Actions – Abusing GitHub And Azure For Fun And Profit

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Magno Logan – Hacking GitHub Actions ...