Application Security News and Articles


Companies need to rethink how they implement identity security

More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, according to Silverfort and Osterman Research. Lack of visibility into the ...

CISOs need to be forceful to gain leverage in the boardroom

Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership, according to BSS. The CISOs said their top four highest investment priorities in 2023 are change management (35%), information security ...

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers

Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG, I2C & SPI protocols and allows to interact with different targets’ voltages (i.e., 1.8, 2.5, ...

CIS SecureSuite membership: Leverage best practices to improve cybersecurity

Whether you’re facing a security audit or interested in configuring systems securely, CIS SecureSuite Membership is here to help. CIS SecureSuite provides thousands of organizations with access to an effective and comprehensive set of ...

From Theory to Practice: Navigating NIST’s CI/CD Security Strategies

On August 30, 2023, NIST published SP 800-204D, an Initial Public Draft (IPD) Named: “Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD pipelines”. The publication takes the SSDF's high-level policies and ...

MGM Resorts Confirms ‘Cybersecurity Issue’, Shuts Down Systems

MGM Resorts confirms "cybersecurity incident" led to the shutdown of web sites and IT systems of hotels throughout the United States. The post MGM Resorts Confirms ‘Cybersecurity Issue’, Shuts Down Systems appeared first on SecurityWeek.

Building Compliance from Scratch with a Culture of Security

For managed service providers (MSPs), building a compliance program from the ground up for an organization is a welcome challenge. But doing so without the full buy-in and active involvement of the organization can feel like an uphill battle – ...

US Marks 22 Years Since 9/11 Terrorist Attacks

One organization is hoping to transform the anniversary of 9/11 into a day of doing good. The post US Marks 22 Years Since 9/11 Terrorist Attacks appeared first on SecurityWeek.

Why Cyber Risk Quantification Needs a Trust Makeover?

With this blog, we begin the series dedicated to exploring the nuances of cyber risk quantification. In the fast-evolving world of cybersecurity, trust is both a necessity and a challenge. CISOs routinely come across tools and techniques that ...

Best Practices of Secrets Management with Kubernetes

Unlock the potential of your Kubernetes deployments by mastering the best practices for managing secrets, as today’s recent data breaches prove that robust secret management and security are paramount. Best Practices of Secrets Management with ...

Do you really need to tell FedEx your Social Security number? How to avoid package-delivery scams

Do you order cartons of strawberries, flat-screen TVs, running shoes, and light bulbs online? You're far from alone. Oberlo reported that in 2023, the number of people who shop online rose to 2.64 billion worldwide. That's equal to 33.3% of the ...

‘BLASTPASS’ iPhone Exploit — Apple Asleep at the Switch

Zero click, zero day, zero clue: Yet another iOS zero-day lets NSO’s Pegasus “mercenary spyware” cause chaos. The post ‘BLASTPASS’ iPhone Exploit — Apple Asleep at the Switch appeared first on Security Boulevard.

News Alert: Traceable AI report exposes true scale of API-related data breaches, top challenges

San Francisco, Calif. —Traceable AI, the industry’s leading API security company, today released its comprehensive research report – the 2023 State of API Security: A Global Study on the Reality of API Risk. Despite APIs being critical to ...

Designed to Be Breached – Automated Document Consumption

By David Neuman, Senior Analyst, TAG Cyber The use of automated document consumption and data extraction processes presents the opportunity for greater business efficiency, lower cost of process ownership, positive customer experience, and…wait ...

Insights from Attack and Defense Drills: Strategies and Resilience

Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023. In these smokeless battles, the attackers advanced with aggressive strategies, while the defenders relied on comprehensive defense ...

Ekran System to Exhibit at it-sa Expo&Congress 2023

Ekran System will participate in the upcoming it-sa Expo&Congress 2023 in Nuremberg, Germany. The event takes place October 10–12, 2023, at the Nuremberg Exhibition Centre. Visit the event to discover cybersecurity products and services ...

A Comprehensive Guide to User Access Review: Best Practices and Pitfalls

In this guide, you will learn how to perform an accurate user access review without succumbing to the common pitfalls. The post A Comprehensive Guide to User Access Review: Best Practices and Pitfalls appeared first on Scytale. The post A ...

Data Breach of AP Stylebook Leads to Phishing Attacks

Users of the AP Stylebook have been targeted in phishing campaigns by bad actors using personal information stolen in a data breach in July. According to the Associated Press, cybercriminals between July 16 and 22 hacked into the database of an ...

After Microsoft and X, Hackers Launch DDoS Attack on Telegram

Anonymous Sudan launches a DDoS attack against Telegram in retaliation for the suspension of their primary account on the platform. The post After Microsoft and X, Hackers Launch DDoS Attack on Telegram appeared first on SecurityWeek.