Application Security News and Articles


How Next-Gen Threats Are Taking a Page From APTs

Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime. The post How Next-Gen Threats Are Taking a Page From APTs appeared first on ...

Salesforce and Google join forces to drive productivity with AI

Salesforce and Google have expanded their strategic partnership to bring together Salesforce and Google Workspace to drive productivity with AI. This partnership will deliver new bidirectional integrations that allow customers to bring together ...

CISA Releases Open Source Software Security Roadmap

CISA details its plan to support the open source software ecosystem and secure the use of open source software within the federal government. The post CISA Releases Open Source Software Security Roadmap appeared first on SecurityWeek.

How MSPs Can Begin Prioritizing Top Attack Surface Use Cases

Businesses are increasingly seeking MSP partnerships. Learn how Cavelo addresses top attack surface use cases, minimizes risk, fosters differentiation and grows revenue. The post How MSPs Can Begin Prioritizing Top Attack Surface Use Cases ...

China Says No Law Banning iPhone Use in Govt Agencies

China said it was following media reports about suspected security issues with iPhones but insisted there was no ban on its officials using the devices The post China Says No Law Banning iPhone Use in Govt Agencies appeared first on SecurityWeek.

Everbridge 360 helps organizations optimize their response efforts

Everbridge has launched Everbridge 360, which empowers organizations to manage critical events, minimize communication delays, and enhance overall operational resilience through a unified dashboard. “At Everbridge, our mission is to ensure the ...

Battling Cybercrime by Combining ASM With CTI

Organizations are increasingly turning to attack surface management (ASM) and cyberthreat intelligence (CTI) as essential components of their cybersecurity programs. The post Battling Cybercrime by Combining ASM With CTI appeared first on ...

CISO Global Deepens Capabilities with Integrated Threat Intelligence Feed

Global cybersecurity provider unveils Threat Informed, a new proprietary capability that captures and analyzes data posted to darknets   Scottsdale, Ariz. September 13, 2023 – CISO Global (NASDAQ: CISO), an industry leader as a managed ...

macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses

The MetaStealer macOS information stealer has been targeting businesses to exfiltrate keychain and other valuable information. The post macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses appeared first on SecurityWeek.

Airbus Launches Investigation After Hacker Leaks Data

Airbus has launched an investigation after a hacker claimed to have breached the company’s systems and leaked some business documents. The post Airbus Launches Investigation After Hacker Leaks Data appeared first on SecurityWeek.

iProov and Cybernetica partner to create a remote identity solution for government and finance onboarding

iProov and Cybernetica collaborate to create a MFA digital identity solution for government and financial services organizations across the EMEA, LATAM, and APAC regions. The Cybernetica and iProov partnership offers a frictionless process for ...

SecurityWeek to Host Cyber AI & Automation Summit

Virtual conference will explore cybersecurity use-cases for AI technology and the race to protect LLM algorithms from adversarial use. The post SecurityWeek to Host Cyber AI & Automation Summit appeared first on SecurityWeek.

MetaStealer malware is targeting enterprise macOS users

Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format (.dmg) files. The names of the files – ...

Bitwarden strengthens security with SSO integrations for businesses

Bitwarden delivers single sign-on integrations for businesses. With the recent addition of SSO with Trusted Devices, the company extends the security, flexibility, and convenience of its products. “Bitwarden provides businesses with the ...

CISA Offering Free Vulnerability Scanning Service to Water Utilities

CISA is offering a free vulnerability scanning service to water utilities to help them protect drinking water and wastewater systems against cyberattacks. The post CISA Offering Free Vulnerability Scanning Service to Water Utilities appeared ...

SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA

SAP has released patches for a critical vulnerability impacting multiple enterprise applications, including NetWeaver and S/4HANA. The post SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA appeared first on SecurityWeek.

Microsoft Teams phishing: Enterprises targeted by ransomware access broker

A threat actor known for providing ransomware gangs with initial access to enterprise systems has began phishing employees via Microsoft Teams. “For this activity, Storm-0324 most likely relies on a publicly available tool called ...

After Apple and Google, Mozilla Also Patches Zero-Day Exploited for Spyware Delivery

After Apple and Google, Mozilla has also patched an image processing-related zero-day vulnerability exploited by spyware. The post After Apple and Google, Mozilla Also Patches Zero-Day Exploited for Spyware Delivery appeared first on SecurityWeek.

Segregation of Duties for Small Businesses

Segregation of Duties in Small BusinessTop 10 SoD controls for Small BusinessSmall businesses are the lifeblood of economies, often characterized by their agility, close-knit teams, and entrepreneurial spirit. With limited resources, they tend to ...

How should SMBs navigate the phishing minefield?

In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes ...