Application Security

GitHub Enterprise Server Gets New Security Capabilities

GitHub Enterprise Server Gets New Security Capabilities 30/08/2023 at 15:31 By Ionut Arghire GitHub Enterprise Server 3.10 released with additional security capabilities, including support for custom deployment rules. The post GitHub Enterprise Server Gets New Security Capabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to […]

React to this headline:

Loading spinner

GitHub Enterprise Server Gets New Security Capabilities Read More »

Signs of Malware Attack Targeting Rust Developers Found on Crates.io

Signs of Malware Attack Targeting Rust Developers Found on Crates.io 28/08/2023 at 17:16 By Eduard Kovacs The Crates.io Rust package registry was targeted in preparation of a malware attack aimed at developers, according to Phylum. The post Signs of Malware Attack Targeting Rust Developers Found on Crates.io appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Signs of Malware Attack Targeting Rust Developers Found on Crates.io Read More »

Google Brings AI Magic to Fuzz Testing With Eye-Opening Results

Google Brings AI Magic to Fuzz Testing With Eye-Opening Results 17/08/2023 at 20:46 By Ryan Naraine Google sprinkles magic of generative-AI into its open source fuzz testing infrastructure and finds immediate success with code coverage. The post Google Brings AI Magic to Fuzz Testing With Eye-Opening Results appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Google Brings AI Magic to Fuzz Testing With Eye-Opening Results Read More »

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns 08/08/2023 at 21:19 By Ryan Naraine Adobe rolls out a big batch of security updates to fix at least 30 Acrobat and Reader vulnerabilities affecting Windows and macOS users. The post Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns Read More »

Apple Lists APIs That Developers Can Only Use for Good Reason

Apple Lists APIs That Developers Can Only Use for Good Reason 31/07/2023 at 21:31 By Ionut Arghire To boost user privacy, Apple is requiring app developers to declare a reason to use specific APIs. The post Apple Lists APIs That Developers Can Only Use for Good Reason appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Apple Lists APIs That Developers Can Only Use for Good Reason Read More »

Inspiring secure coding: Strategies to encourage developers’ continuous improvement

Inspiring secure coding: Strategies to encourage developers’ continuous improvement 25/07/2023 at 07:38 By Mirko Zorz In software development, the importance of secure coding practices cannot be overstated. Fostering a security culture within development teams has become crucial to ensure the integrity and protection of digital systems. To delve deeper into this topic, we had the

React to this headline:

Loading spinner

Inspiring secure coding: Strategies to encourage developers’ continuous improvement Read More »

LLMs and AI positioned to dominate the AppSec world

LLMs and AI positioned to dominate the AppSec world 20/07/2023 at 07:33 By Help Net Security As modern software trends toward distributed architectures, microservices, and extensive use of third-party and open source components, dependency management only gets harder, according to Endor Labs. Application development risks A new research report explores emerging trends that software organizations

React to this headline:

Loading spinner

LLMs and AI positioned to dominate the AppSec world Read More »

API Flaw in QuickBlox Framework Exposed PII of Millions of Users

API Flaw in QuickBlox Framework Exposed PII of Millions of Users 13/07/2023 at 21:18 By Kevin Townsend QuickBlox SDK and API vulnerabilities impact chat and video applications used by industries including telemedicine, smart IoT, and finance. The post API Flaw in QuickBlox Framework Exposed PII of Millions of Users appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

API Flaw in QuickBlox Framework Exposed PII of Millions of Users Read More »

Infrastructure upgrades alone won’t guarantee strong security

Infrastructure upgrades alone won’t guarantee strong security 13/07/2023 at 06:31 By Help Net Security While 75% of organizations have made significant strides to upgrade their infrastructure in the past year, including the adoption of public cloud hosting and containerization, and 78% have increased their security budgets, only 2% of industry experts are confident in their

React to this headline:

Loading spinner

Infrastructure upgrades alone won’t guarantee strong security Read More »

Adobe Patch Tuesday: Critical Flaws Haunt InDesign, ColdFusion

Adobe Patch Tuesday: Critical Flaws Haunt InDesign, ColdFusion 11/07/2023 at 20:33 By Ryan Naraine Software maker calls special attention to CVE-2023-29300, a deserialization of untrusted data bug with a CVSS severity score of 9.8/10. The post Adobe Patch Tuesday: Critical Flaws Haunt InDesign, ColdFusion appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Adobe Patch Tuesday: Critical Flaws Haunt InDesign, ColdFusion Read More »

Exploit Code Published for Remote Root Flaw in VMware Logging Software

Exploit Code Published for Remote Root Flaw in VMware Logging Software 10/07/2023 at 23:02 By Ryan Naraine VMware confirmed that exploit code for CVE-2023-20864 has been published, underscoring the urgency for enterprise network admins to apply available patches. The post Exploit Code Published for Remote Root Flaw in VMware Logging Software appeared first on SecurityWeek.

React to this headline:

Loading spinner

Exploit Code Published for Remote Root Flaw in VMware Logging Software Read More »

OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain

OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain 07/07/2023 at 16:31 By Kevin Townsend SwSec 5D framework aims to provide a roadmap for secure software development, and its use would help improve security in the software supply chain. The post OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply

React to this headline:

Loading spinner

OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain Read More »

Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert

Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert 06/07/2023 at 23:04 By Ryan Naraine Hackers linked to the Truebot malware are exploiting a year-old Netwrix Auditor flaw to break into organizations in the U.S. and Canada. The post Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert Read More »

MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses

MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses 30/06/2023 at 15:16 By Ionut Arghire Use-after-free and OS command injection vulnerabilities reach the top five most dangerous software weaknesses in the 2023 CWE Top 25 list. The post MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses Read More »

Employees worry less about cybersecurity best practices in the summer

Employees worry less about cybersecurity best practices in the summer 30/06/2023 at 04:17 By Help Net Security IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often

React to this headline:

Loading spinner

Employees worry less about cybersecurity best practices in the summer Read More »

Nokod Snags $8M to Secure Low Code/No-Code Custom Apps

Nokod Snags $8M to Secure Low Code/No-Code Custom Apps 29/06/2023 at 16:47 By Ryan Naraine Tel Aviv startup scores investment to build technology to secure in-house low-code/no-code custom applications. The post Nokod Snags $8M to Secure Low Code/No-Code Custom Apps appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Nokod Snags $8M to Secure Low Code/No-Code Custom Apps Read More »

CISA, NSA Share Guidance on Securing CI/CD Environments

CISA, NSA Share Guidance on Securing CI/CD Environments 29/06/2023 at 15:17 By Ionut Arghire New guidance from CISA and the NSA provides recommendations on securing CI/CD pipelines against malicious attacks. The post CISA, NSA Share Guidance on Securing CI/CD Environments appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

CISA, NSA Share Guidance on Securing CI/CD Environments Read More »

Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites

Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites 21/06/2023 at 19:14 By Ionut Arghire Two critical-severity authentication bypass vulnerabilities in WordPress plugins with tens of thousands of installations. The post Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites Read More »

The limitations of shifting left in application security

The limitations of shifting left in application security 21/06/2023 at 07:40 By Help Net Security In this Help Net Security video, Jacob Garrison, Security Research for Bionic, explains the limitations of shifting left in application security. Key factors hindering the effectiveness of shifting left: Achieving 50%+ application test coverage is unrealistic, especially in microservices environments

React to this headline:

Loading spinner

The limitations of shifting left in application security Read More »

Scroll to Top