AppSec

Ukraine Beats Russia in Cyberwarfare — at ‘Unprecedented Scale’
Richi Jennings | | ddos, GRU, IT Army, NotPetya, PSYOPS, Russia, Sandworm, SB Blogwatch, Tunguska comet should have hit Moscow, Ukraine, Unit 74455
Russia is attacking Ukraine with cyberattacks and psyops. But the scale is pathetic and Ukraine is fighting back—hard ...
Security Boulevard

ThreatX Update Provides More Visibility Into API Security
ThreatX today expanded its namesake platform for protecting application programming interfaces (APIs) to provide increased visibility into the size of the attack surface and the scope of the attacks being launched against ...
Security Boulevard

What You Need to Scale AppSec
Security is a dilemma for many leaders. On the one hand, it is largely recognized as an essential feature. On the other hand, it does not drive business. Of course, as we ...
Security Boulevard

‘Crypto Bug of the Year’ Fixed — Update Java NOW
Richi Jennings | | CVE-2022-21449, Digital Signature, ECDSA, Elliptic Curve Cryptography, Elliptic Curve Digital Signature Algorithm, Java, Neil Madden, Oracle, Psychic Signatures, SB Blogwatch
A ridiculously dumb flaw in Java’s signature checking code is patched. This isn’t some crufty legacy Sun code, but actual garbage Oracle sloppiness that’s causing IT people to chase their tails yet again ...
Security Boulevard

Prioritizing Security a Challenge for Dev Teams
Security has long been seen as an afterthought in the DevOps process, and a new report from Secure Code Warrior offers a reason why. While developers say a security-led approach is important ...
Security Boulevard

The Top 7 Most Common Web Vulnerabilities
Bill Doerrfeld | | AppSec, Cross-Site Request Forgery (CSRF) Vulnerabilities, Cross-Site Scripting (XSS) Vulnerabilities, invicti, sql injection, web vulnerabilities
Invicti has published the Spring 2022 Edition of The Invicti AppSec Indicator, a comprehensive study that ranks the most common web vulnerabilities. To conduct their research, Invicti analyzed 939 customers across the ...
Security Boulevard

China Conquers Confidential Comms – U.S. Utterly Undone
Richi Jennings | | QSDC, quantum entanglement, quantum key distribution, SB Blogwatch, Tsinghua University, Would be quicker to send a message on horseback
Chinese researchers have achieved yet another security advance: They managed to communicate across a distance of more than 60 miles. The aptly named Prof. Long (pictured) and his team at Tsinghua University ...
Security Boulevard

Can GitOps Improve Application Security?
GitOps is a set of practices for managing infrastructure and application deployment using Git version control systems. GitOps uses a Git repository as a single source of truth for declarative configuration of ...
Security Boulevard

Trans-Atlantic Data Privacy Framework’s Impact on AppSec
Earlier this year, the White House announced that it is working with the European Union on a Trans-Atlantic Data Privacy Framework. According to a White House statement, this framework will “reestablish an ...
Security Boulevard

Russia Tries to Kill Ukraine’s Power Grid—and FAILS
Richi Jennings | | electric grid, ICS, Industroyer, Industroyer2, power grid, Russia, Sandworm, Sandworm hackers—are they working for the Harkonnen?, SB Blogwatch, SCADA, Ukraine
Russia’s infamous Sandworm APT group is at it again: The scrotes have been trying to cut power to the Ukrainian capital ...
Security Boulevard