Application Security News and Articles


Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% of organizations had ...

ISO 27001 Implementation Checklist: 10 Tips to Become Certification Ready

ISO/IEC 27001 is an information security standard designed and regulated by the International Organization for Standardization, and while it isn’t legally mandated, having the certification is essential for securing contracts with large ...

Product Updates- Sept 2023

We’re excited to announce 5 new features coming to PreVeil: TOTP 2FA (Time-based One Time Passcode) PreVeil Express users can now choose their preferred method of 2 factor authentication: SMS passcodes or passcodes from an authenticator app ...

BSides Buffalo 2023 – Dr. Catherine J Ullman – Defending Beyond Defense

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Dr. Catherine J Ullman – Defending ...

How Much Does it Cost to Get SOC 2?

How much does it cost to get SOC 2? A commonly asked question about SOC 2 is “How much does a SOC 2 attestation cost?” However, there isn’t a single answer, because the cost depends on multiple factors. The total costs of a SOC 2 audit can ...

SafeBreach Coverage for US-CERT Alert AA23-250A

Nation-state advanced persistent threat (APT) actors Exploited CVE-2022-47966 and CVE-2022-42475 to access an aeronautics organization's web server and firewall. The post SafeBreach Coverage for US-CERT Alert AA23-250A appeared first on ...

Google Kills 3rd-Party Cookies — but Monopolizes AdTech

Firefox looking good right now: “Privacy Sandbox” criticized as a proprietary, hypocritical, anti-competitive, self-serving contradiction. The post Google Kills 3rd-Party Cookies — but Monopolizes AdTech appeared first on Security Boulevard.

Cybersecurity Insights with Contrast CISO David Lindner | 9/8

Insight #1  Prompt injection is becoming a serious concern for those using current AI technologies. When using AI, make sure you have a way to at least detect these injection attempts if not block them. The post Cybersecurity Insights with ...

Daniel Stori’s ‘Advanced-Species’

via the webcomic talent of the inimitable Daniel Stori at Turnoff.US. Permalink The post Daniel Stori’s ‘Advanced-Species’ appeared first on Security Boulevard.

BSides Buffalo 2023 – Zack Glick – How to Read a Breach Notification

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Zack Glick – How to Read a Breach ...

Emsisoft to Users: Update Software, Reboot Systems After Certificate Error

Cybersecurity firm Emsisoft is telling users to update their anti-virus and other security software in the wake of an error with its code signing certificate that could cause the products to malfunction and make organizations more vulnerable to ...

Zero-Trust: 5 Steps to Transition From Hype to Reality

The paradigm shift toward zero-trust has been years in the making for some organizations, while others still regard it as an aspiration. Although many organizations have touted their success in implementing the key principles, the journey toward ...

Handling Secrets with AWS Secrets Manager

This tutorial helps you better understand AWS Secrets Manager, how it works under the hood and how to access it from Kubernetes clusters. The post Handling Secrets with AWS Secrets Manager appeared first on Security Boulevard.

Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks. The post Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks appeared first on SecurityWeek.

New Phishing Campaign Launched via Google Looker Studio

Check Point has observed a wave of phishing attacks launched via Google Looker Studio to steal credentials and funds from intended victims. The post New Phishing Campaign Launched via Google Looker Studio appeared first on SecurityWeek.

Fortifying the Foundation: Empowering a Zero-Trust Security Paradigm

Zero-trust has become a significant trend as organizations adapt to a world where perimeter security no longer offers sufficient protection. The post Fortifying the Foundation: Empowering a Zero-Trust Security Paradigm appeared first on Security ...

PallyCon DRM License Cipher protects users against software-level DRM vulnerabilities

PallyCon has introduced a new feature called PallyCon DRM License Cipher, designed to address vulnerabilities in software-level DRM solutions. In today’s digital era, the protection of digital content is more crucial than ever. Digital ...

In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach 

Noteworthy stories that might have slipped under the radar: LastPass vault hacking, Russia targets energy facility in Ukraine, NXP data breach. The post In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach  ...

How to Hire an Ideal Azure Cloud Engineer for your business?

The annual growth rates of Google Cloud Platform (GCP) and Azure Management Services (AMS) are almost twice as high as those of Amazon Web Services (AWS), according to CB Insight. Microsoft statistics show that 95% of Fortune 500 businesses rely ...

The Conti Ransomware Gang and the Trickbot Cybercrime Enterprise XMPP’s and Jabber Account IDs

The power of OSINT and real-time OSINT which has been my methodology since December, 2005 when I originally launched this blog? Check out the following analysis courtesy of me which details in-depth who's behind the Conti Ransomware Gang and the ...