Application Security News and Articles


North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx

North Korean hackers stole $53 million in cryptocurrency from crypto exchange CoinEx after the hot wallet private key was leaked. The post North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx appeared first on SecurityWeek.

Report Surfaces Root Causes of Cloud Security Issues

Palo Alto Networks found that half of the critical exposures discovered in cloud computing environments can be traced back to recently added or updated cloud services. The post Report Surfaces Root Causes of Cloud Security Issues appeared first ...

Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack

A known ransomware gang has taken credit for the highly disruptive cyberattack on MGM Resorts, and the company has yet to restore impacted systems. The post Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack appeared first on ...

Lacework expands partnership with Snowflake to drive secure cloud growth

Lacework and Snowflake announced an expanded partnership that advances the future of cloud infrastructure and further automates cloud security at scale. The extended partnership empowers security teams with direct access to their Lacework cloud ...

Real-time Security Alerts via Microsoft Teams

Enhance Kubernetes security through seamless ARMO Platform and Microsoft Teams integration. Click here to learn how! The post Real-time Security Alerts via Microsoft Teams appeared first on ARMO. The post Real-time Security Alerts via Microsoft ...

Attackers use fallback ransomware if LockBit gets blocked

Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates are using the 3AM ransomware as a fallback option in case LockBit gets ...

SecurityScorecard and Measured Analytics and Insurance strengthen proactive cybersecurity strategies

SecurityScorecard announced an alliance with Measured Analytics and Insurance, the AI-powered cyber insurance provider. The initiative delivers a cyber insurance premium incentive (e.g., discounts) for Security Ratings. “Together with ...

CISO Global 2023-09-14 06:00:00

Author: Samuel Lewis, Senior Security Consultant, CISO Global Over the past several years, an increasingly fluid work environment has followed trends of modern globalization in the workplace. Leveraging cloud solutions, many companies have let go ...

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)

NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments.” Enterprise application environments consist of geographically ...

5 Strategies for Reliable Protection Against BEC Scams

The recent Cloudflare 2023 Phishing Threats Report unravels many interesting statistics about the global landscape of business email compromise (BEC) attacks. BEC is now one of the top cybersecurity threats worldwide. And per the report, 71% of ...

Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS

Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals, organizations, government agencies, law enforcement agencies, and businesses that need security and privacy with ...

Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS ...

The critical role of authorization in safeguarding financial institutions

According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video, ...

OpenSSF SCM Best Practices Guide Released With Contributions From Legitify

We're thrilled to share that the OpenSSF SCM Best Practices working group has released its SCM Best Practices Guide. This guide is the result of collaborative efforts between Legit Security and several of the industry's top security vendors under ...

Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. MVT supports using public indicators of ...

NSFOCUS Ranked No. 2 in China Network Detection and Response Market 2022

IDC has recently published its China Network Detection and Response (NDR) Market Report for 2022, which provides a comprehensive analysis of the market development, functions, and technologies pertaining to Network Detection and Response (NDR) ...

Rising OT/ICS cybersecurity incidents reveal alarming trend

60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research ...

Download: Ultimate guide to Certified in Cybersecurity

The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get started with FREE training and exam through ISC2’s 1MCC program! No experience is required, just a passion for ...

Tech Industry Leaders Endorse Regulating Artificial Intelligence at Rare Summit in Washington

Tech executives discussed the idea of government regulations for artificial intelligence (AI) at an unusual closed-door meeting in the U.S. Senate on September 13th. The post Tech Industry Leaders Endorse Regulating Artificial Intelligence at ...