Application Security News and Articles


Insights from Attack and Defense Drills: Strategies and Resilience

Recently, NSFOCUS SOC team summarized the findings from attack and defense drills in the first half of 2023. In these smokeless battles, the attackers advanced with aggressive strategies, while the defenders relied on comprehensive defense ...

Ekran System to Exhibit at it-sa Expo&Congress 2023

Ekran System will participate in the upcoming it-sa Expo&Congress 2023 in Nuremberg, Germany. The event takes place October 10–12, 2023, at the Nuremberg Exhibition Centre. Visit the event to discover cybersecurity products and services ...

A Comprehensive Guide to User Access Review: Best Practices and Pitfalls

In this guide, you will learn how to perform an accurate user access review without succumbing to the common pitfalls. The post A Comprehensive Guide to User Access Review: Best Practices and Pitfalls appeared first on Scytale. The post A ...

Data Breach of AP Stylebook Leads to Phishing Attacks

Users of the AP Stylebook have been targeted in phishing campaigns by bad actors using personal information stolen in a data breach in July. According to the Associated Press, cybercriminals between July 16 and 22 hacked into the database of an ...

After Microsoft and X, Hackers Launch DDoS Attack on Telegram

Anonymous Sudan launches a DDoS attack against Telegram in retaliation for the suspension of their primary account on the platform. The post After Microsoft and X, Hackers Launch DDoS Attack on Telegram appeared first on SecurityWeek.

Fortinet partners with Wiz to help enterprises protect their cloud environments

Fortinet and Wiz announced that Wiz has joined the Fortinet Fabric-Ready Technology Alliance Partner Program and Fortinet has joined the Wiz Integration (WIN) Program. The two companies have jointly developed an integrated solution to help ...

The Small Idea With a Big Impact on the Cybersecurity Talent Gap

The cost of cybercrime is expected to reach $8 trillion globally this year, yet the scarcity of security talent is becoming more pronounced. With more than 750,000 cybersecurity positions unfilled in the U.S. and 3.5 million positions worldwide ...

Bookstore Chain Dymocks Discloses Data Breach Possibly Impacting 800k Customers

The personal information of more than 800,000 individuals was stolen from bookstore chain Dymocks in a cyberattack last week. The post Bookstore Chain Dymocks Discloses Data Breach Possibly Impacting 800k Customers appeared first on SecurityWeek.

From the Internet to the Cloud: A Revolution in Computing and Security

The journey from the early days of the internet to the rise of cloud systems has revolutionized how businesses operate and access computing resources. The post From the Internet to the Cloud: A Revolution in Computing and Security appeared first ...

Holy Macroni! A recipe for progressive language enhancement

By Brent Pappas Despite its use for refactoring and static analysis tooling, Clang has a massive shortcoming: the Clang AST does not provide provenance information about which CPP macro expansions a given AST node is expanded from; nor does it ...

Identity Protection Can’t be Taken for Granted Anymore

The findings in report challenge the implicit trust that the purchase and deployment of an identity security solution equals protection The post Identity Protection Can’t be Taken for Granted Anymore appeared first on Silverfort. The post ...

The Azure Metadata Protection You Didn’t Know Was There

Some Azure services have an additional, not widely known, protection mechanism against session token exfiltration The post The Azure Metadata Protection You Didn’t Know Was There appeared first on Ermetic. The post The Azure Metadata Protection ...

Associated Press Stylebook Users Targeted in Phishing Attack Following Data Breach

Cybercriminals breached an AP Stylebook website and obtained information on customers who were then targeted in phishing attacks.  The post Associated Press Stylebook Users Targeted in Phishing Attack Following Data Breach appeared first on ...

On Robots Killing People

The robot revolution began long ago, and so did the killing. One day in 1979, a robot at a Ford Motor Company casting plant malfunctioned—human workers determined that it was not going fast enough. And so twenty-five-year-old Robert Williams ...

FBI Blames North Korean Hackers for $41 Million Stake.com Heist

FBI says North Korean hacking group Lazarus has stolen $41 million in cryptocurrency from online betting platform Stake.com. The post FBI Blames North Korean Hackers for $41 Million Stake.com Heist appeared first on SecurityWeek.

Spies, Hackers, Informants: How China Snoops on the West

Some of the ways China has worked to spy on the West in recent years. The post Spies, Hackers, Informants: How China Snoops on the West appeared first on SecurityWeek.

Microsoft Teams users targeted in phishing attack delivering DarkGate malware

A new phishing campaign taking advantage of an easily exploitable issue in Microsoft Teams to deliver malware has been flagged by researchers. Delivering malware to Microsoft Teams users Late last month, Truesec researchers spotted two ...

SecuX Shield BIO enhances crypto security

SecuX revealed its latest creation, the Shield BIO card-type hardware wallet. The Shield BIO combines biometric fingerprint authentication with the handy format of a credit card. At the heart of this wallet is the military-grade Secure Element ...

Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices

A researcher has found 7 vulnerabilities in Socomec UPS products that can be exploited to hijack and disrupt devices.  The post Vulnerabilities Allow Hackers to Hijack, Disrupt Socomec UPS Devices appeared first on SecurityWeek.

Ten Ways Organizations Can Fill the Cybersecurity Skills Gap

The cybersecurity skills gap is throttling recruitment, but organizations can make plans and get the best of the latest crop of recruits  Cybersecurity menaces have multiplied in recent years, as we know all too well, growing in complexity and ...