Application Security News and Articles


GLBA, Cybersecurity, and Your Business: Conquering Hidden Threats with CDR

Cybercriminals incessantly refine their stratagems and ploys, aiming to bypass a firm’s security framework using hidden threats in files. According to research by Verizon, ransomware and other threats hidden in files are one of the top risks ...

The Team8 Foundry Method for Selecting Investable Startups

Team8, a VC organization with added sauce, queried more than 130 CISOs from its own ‘CISO Village’ to discover the concerns of existing cybersecurity practitioners, and the technologies they are seeking for the future. The post The Team8 ...

Perception Point combats QR code phishing threats using image recognition

Perception Point unveiled new solution to address the escalating threat of QR code phishing, commonly referred to as “quishing”. With the recent influx in quishing campaigns, the need for a definitive solution has never been more ...

Rezilion Recognized in Four Gartner® Hype Cycle™ Reports and the 2023 Gartner Market Guide for Vulnerability Assessment 

Rezilion Named SBOM Vendor in Gartner Hype Cycle for Software Engineering and Representative Vendor for Vulnerability Assessment and Vulnerability Prioritization Technology  NEW YORK, Sept. 6, 2023 — Rezilion, an automated software supply ...

Sprinklr integrates with Google Cloud for unified customer experience management

Sprinklr has unveiled the integration of the Sprinklr AI+ platform with Google Cloud’s Vertex AI for unified customer experience management. Sprinklr AI+ gives brands unified generative AI capabilities for customer service, insights, social ...

BSides Buffalo 2023 – Kelsey Seymour – Dispelling The Myth Of “Maturity” In Threat Hunting

Many thanks to BSides Buffalo for publishing their presenter’s outstanding BSides Buffalo security content on the organizations’ YouTube channel. Permalink The post BSides Buffalo 2023 – Kelsey Seymour – Dispelling The Myth Of ...

Why Legal Regulation Shifts Responsibility for Software Supply Chain Security to Vendors

The recent publication of cybersecurity strategies by governments of leading economies could create significant change in software supply chain security by shifting responsibility towards vendors and imposing best practices. This blog looks at ...

See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack

See Tickets is informing 300,000 individuals that their payment card information was stolen in a new web skimmer attack. The post See Tickets Alerts 300,000 Customers After Another Web Skimmer Attack appeared first on SecurityWeek.

Druva unveils new security and cyber resilience capabilities for MSPs

Druva released its cyber resiliency offerings for Managed Service Providers (MSPs) globally. The Security Posture and Observability (SP&O) and Accelerated Ransomware Recovery (ARR) solutions enable Druva MSP partners to harness ransomware ...

How Chinese hackers got their hands on Microsoft’s token signing key

The mystery of how Chinese hackers managed to steal a crucial signing key that allowed them to breach Microsoft 365’s email service and access accounts of employees of 25 government agencies has been explained: they found it somewhere where it ...

CISA Releases Guidance on Adopting DDoS Mitigations

CISA has released new guidance to help federal agencies decide upon and prioritize DDoS mitigations based on mission and reputational impact. The post CISA Releases Guidance on Adopting DDoS Mitigations appeared first on SecurityWeek.

Accenture and Workday help companies reinvent their finance functions

Accenture and Workday are expanding their partnership to help organizations reinvent their finance functions to be more agile, data-driven and customer-centric. The companies are collaborating to develop a suite of data-led, composable finance ...

‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign

A malware named Atomic macOS Stealer (AMOS) has been delivered to users via a malvertising campaign.  The post ‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign appeared first on SecurityWeek.

AUCloud selects SentinelOne for government and business security

AUCloud has deployed SentinelOne’s Singularity Platform to keep its business operations and the critical digital infrastructure it supplies to some of the nation’s most trusted government agencies and enterprises safe. “As a growing cloud ...

Orca Security Adds Generative AI Asset Search Tool

Orca Security's generative AI tool lets cybersecurity teams discover what assets are running in their cloud computing environments. The post Orca Security Adds Generative AI Asset Search Tool appeared first on Security Boulevard.

AI Data Consumption and Analysis are a Cybersecurity Force Multiplier

Cybercriminals are creating smarter attacks using AI’s ability to increase its own knowledge as it consumes data. Data analysis can help. The post AI Data Consumption and Analysis are a Cybersecurity Force Multiplier appeared first on Security ...

Zero Trust Security | Trust ‘Zero Trust’ for Application Security | Contrast Security

The perimeter cybersecurity model is like the defensive walls that surround ancient cities. For thousands of years, these walls provided stout defense against invaders arriving by horse and on foot.  The post Zero Trust Security | Trust ‘Zero ...

Attention CISOs: Closing Your Identity Protection Gaps is Urgent

Here’s something that won’t be news to you: The identity attack surface is exposed to attacks. But what about your own organization? Do you know where your specific protection gaps are? A new report released by Osterman Research, entitled ...

Cisco Patches Critical Vulnerability in BroadWorks Platform

Cisco has released patches for CVE-2023-20238, a critical authentication bypass vulnerability in the BroadWorks Application Delivery Platform. The post Cisco Patches Critical Vulnerability in BroadWorks Platform appeared first on SecurityWeek.

Embracing a New Chapter: My Journey to Sectigo as Chief Financial Officer

I'm thrilled to share the exciting news that I recently joined the Sectigo family as Chief Financial Officer, and I couldn't be more enthusiastic about this new chapter in my career. Firstly, I want to express my gratitude to Kevin Weiss, the ...