Last week, security researchers identified a zero-day vulnerability that was instrumental in a targeted attack against companies in Eastern Europe.
A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.
Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.
Beyond the obvious benefit of proactively identifying application security incidents, threat modeling gives security leaders opportunities to educate developers and foster a DevSecOps culture.
It's time for cloud security teams to turn the tables on malicious actors and use doxing — in the form of attacker reconnaissance — to uncover vulnerabilities before they turn into full-blown threats.
Application containers can reduce costs and streamline software development, but they also increase the attack surface, necessitating strict adherence to container security best practices.
When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing.
While AI in cybersecurity is still in its infancy, the inaugural Ai4 Cybersecurity conference was a great first step in advancing the discussion, especially as it relates to application security.
Malicious actors are bundling a Trojan called Pirate Chick, which looks like a virtual private network (VPN) software tool, into adware to install malware on infected machines.
Containerization empowers businesses to move apps across different platforms and environments. Here's why security best practices need to evolve.