Application Security News and Articles
The perimeter cybersecurity model is like the defensive walls that surround ancient cities. For thousands of years, these walls provided stout defense against invaders arriving by horse and on foot.
The post Zero Trust Security | Trust ‘Zero ...
Here’s something that won’t be news to you: The identity attack surface is exposed to attacks. But what about your own organization? Do you know where your specific protection gaps are? A new report released by Osterman Research, entitled ...
Cisco has released patches for CVE-2023-20238, a critical authentication bypass vulnerability in the BroadWorks Application Delivery Platform.
The post Cisco Patches Critical Vulnerability in BroadWorks Platform appeared first on SecurityWeek.
I'm thrilled to share the exciting news that I recently joined the Sectigo family as Chief Financial Officer, and I couldn't be more enthusiastic about this new chapter in my career.
Firstly, I want to express my gratitude to Kevin Weiss, the ...
Tenable is set to acquire cloud security firm Ermetic for $240 million as it looks to expand the capabilities of its exposure management platform.
The post Tenable to Acquire Cloud Security Firm Ermetic for $240 Million appeared first on ...
Tenable Holdings has signed a definitive agreement to acquire Ermetic. Tenable intends to integrate Ermetic’s capabilities into its Tenable One Exposure Management Platform to deliver contextual risk visibility, prioritization, and ...
Keeping current with the latest developments in application security can be challenging and time-consuming. One way to make it less so is to have a go-to list of active online application security pros to follow who can keep you up to date on the ...
Fashion retailer Forever 21 has revealed a data breach that has affected more than 500,000 individuals. The breach, which took place over three months starting in early January 2023, saw unauthorized access to the company’s systems, ...
A newer version of the Atomic Stealer macOS malware has a new trick that allows it to bypass the operating system’s Gatekeeper, Malwarebytes researchers have discovered. Mac malware delivered through Google ads The malware, which was first ...
Pynt released its autopilot platform for API security used by developers and security experts, as well as $6 million in Seed funding led by Joule Ventures with the participation of Dallas VC and Honeystone VC. The use of APIs is exploding, with ...
Vulnerabilities identified in the OAS Platform could be exploited to bypass authentication, leak sensitive information, and overwrite files.
The post Cisco Finds 8 Vulnerabilities in OAS Industrial IoT Data Platform appeared first on SecurityWeek.
IBM has disclosed a data breach involving a Janssen healthcare platform that last year helped more than 1 million patients.
The post IBM Discloses Data Breach Impacting Janssen Healthcare Platform appeared first on SecurityWeek.
SafeBase announced that it is acquiring Stacksi, the A.I.-powered security questionnaire automation platform. The acquisition advances the two companies’ shared vision to eliminate the time-consuming, cumbersome task of responding to security ...
The value of mapping vulnerability can’t be overstated to know our applications and their interactions Applications drive our personal and professional lives. From banking apps on our phones to software that powers critical business ...
In 2023, email remains one of the most popular channels for business communications. Unfortunately, cybercriminals and cyberterrorists are aware of this fact, which is why they continue to exploit email applications. In fact, according to the ...
Securing cloud environments is a top priority for organizations today. However, merely acknowledging this fact is not enough. Despite 95% of organizations expressing concern about cloud security, only 40% feel confident in their ability to secure ...
Partnering with the US Department of Defense (DoD) as a contractor offers lucrative prospects for your company, but it comes with the responsibility of adhering to multiple cybersecurity frameworks. The latest framework on the DoD scene is CMMC ...
LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s ...
To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. Implement role-based access control In the context of generative AI, ...
Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple malicious purposes, such as sending phishing emails, hosting fraudulent websites, rerouting web ...