Application Security News and Articles


US Deportation Airline GlobalX Confirms Hack

Global Crossing Airlines is investigating a cybersecurity incident after Anonymous hackers targeted its systems. The post US Deportation Airline GlobalX Confirms Hack appeared first on SecurityWeek.

Firewall Rule Bloat: The Problem and How AI can Solve it

Long lists of firewall rules can lead to misaligned and inconsistent policies, creating gaps in your security perimeter for threat actors to exploit.  The post Firewall Rule Bloat: The Problem and How AI can Solve it appeared first on Security ...

Cybersecurity’s Early Warning System: How Live Network Traffic Analysis Detects The ‘Shock Wave’ Before the Breach ‘Tsunami’ 

Security teams can analyze live network traffic, an approach also known as network detection and response, and be more proactive in detecting the warning signs of an impending breach. The post Cybersecurity’s Early Warning System: How Live ...

Ensuring High Availability and Resilience in the ‘Everything App’ Era  

This critical shift of social media apps becoming “mission-critical” everything apps requires a different approach when it comes to resiliency.    The post Ensuring High Availability and Resilience in the ‘Everything App’ Era   ...

Resecurity One simplifies cybersecurity operations

Resecurity launched Resecurity One, the next-generation cybersecurity platform designed to improve how organizations approach cybersecurity. Resecurity One combines Digital Risk Management, Cyber Threat Intelligence, Endpoint Protection, Identity ...

German Authorities Take Down Crypto Swapping Service eXch

German authorities seized the servers of crypto-swapping service eXch for laundering approximately $1.9 billion in fraudulent assets. The post German Authorities Take Down Crypto Swapping Service eXch appeared first on SecurityWeek.

The 47-day update: an expected evolution in digital security

The passage of the CA/Browser Forum ballot to reduce the maximum certificate lifespan to 47 days represents a natural and anticipated progression in the industry’s ongoing effort to enhance security and streamline certificate management. This ...

US Announces Botnet Takedown, Charges Against Russian Administrators

Anyproxy and 5socks, websites offering proxy services through devices ensnared by a botnet, have been disrupted in a law enforcement operation. The post US Announces Botnet Takedown, Charges Against Russian Administrators appeared first on ...

Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update to how devices manage privacy and power. The update, called Bluetooth Randomized RPA (resolvable private address) Updates, ...

Why security teams cannot rely solely on AI guardrails

In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. The findings highlight how even billion-dollar LLMs can be bypassed ...

How to give better cybersecurity presentations (without sounding like a robot)

Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or ...

SPIRE: Toolchain of APIs for establishing trust between software systems

SPIRE is a graduated project of the Cloud Native Computing Foundation (CNCF). It’s a production-ready implementation of the SPIFFE APIs that handles node and workload attestation to securely issue SVIDs to workloads and verify the SVIDs of ...

Layoffs pose a cybersecurity risk: Here’s why offboarding matters

In this Help Net Security video, Chase Doelling, Principal Strategist at JumpCloud, discusses the overlooked security risks associated with improper offboarding. Though many organizations focus on securely onboarding new employees, they often ...

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting ...

Despite drop in cyber claims, BEC keeps going strong

Ransomware claims stabilized in 2024 despite remaining the most costly and disruptive type of cyberattack, according to Coalition. 60% of 2024 claims originated from BEC and funds transfer fraud (FTF) incidents, with 29% of BEC events resulting ...

How to Stay Ahead of the Curve with AirSwap $sAST

Stay Ahead of the Game with These Staking Tips for AirSwap $sASTContinue reading on Medium »

Justify Your Investment in Cloud-Native NHIs

Are Your Investments in Cloud-Native NHIs Justified? A new hero has emerged, capable of handling complex security threats to cloud. Meet Non-Human Identities (NHIs), the machine identities that have revolutionized cybersecurity operations. ...

Achieve Stability with Streamlined Secrets Management

Can Streamlined Secrets Management Enhance Stability? Secrets management can be likened to a well-kept vault of confidential data, critical to the security and performance of any system. Where data breaches are prevalent, effective secrets ...

BSidesLV24 – Proving Ground – The Immortal Retrofuturism Of Mainframe Computers And How To Keep Them Safe

Author/Presenter: Michelle Eggers Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

How to Get the Most Out of Your AirSwap $sAST Rewards

Mastering the Art of Maximizing Your $sAST EarningsContinue reading on Medium »