informa
/

Application Security

CISA Launches New Vulnerability Disclosure Policy Platform
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
July 30, 2021
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
by Dark Reading Staff, Dark Reading
July 30, 2021
2 min read
Article
Next for Bug Bounties: More Open Source Funding
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
July 30, 2021
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
by Robert Lemos, Contributing Writer
July 30, 2021
5 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
July 29, 2021
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
by Andy Robbins, Technical Architect, SpecterOps
July 29, 2021
6 min read
Article
Salt Security 'State of API Security' Report Finds API Attack Traffic has Grown at Triple the Rate of Overall API Traffic
Additional report findings include 64% of survey respondents have delayed an application rollout over API security conce...
July 28, 2021
Additional report findings include 64% of survey respondents have delayed an application rollout over API security conce...
July 28, 2021
6 min read
Article
Major Email Providers Add Brand-Verification Technology to Help Thwart Phishing
Google and other large providers are adopting BIMI, a technology for authenticated branding that could help drive securi...
July 28, 2021
Google and other large providers are adopting BIMI, a technology for authenticated branding that could help drive securi...
by Robert Lemos, Contributing Writer
July 28, 2021
4 min read
Article
Google Debuts New Bug Hunting Platform
The new platform brings bug reporting for all Google targets into one place.
July 27, 2021
The new platform brings bug reporting for all Google targets into one place.
by Dark Reading Staff, Dark Reading
July 27, 2021
1 min read
Article
Software Time-to-Fix Plateaus as More Apps Tested
The average critical vulnerability took 202 days to fix over the past 12 months, a scarce improvement over 205 days from...
July 27, 2021
The average critical vulnerability took 202 days to fix over the past 12 months, a scarce improvement over 205 days from...
by Robert Lemos, Contributing Writer
July 27, 2021
4 min read
Article
Attackers' Use of Uncommon Programming Languages Continues to Grow
Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process m...
July 26, 2021
Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process m...
by Kelly Sheridan, Senior Editor
July 26, 2021
5 min read
Article
Florida DEO Discloses Data Breach Affecting 58,000 Accounts
The Florida Department of Economic Opportunity says personal information may have been taken from its unemployment benef...
July 26, 2021
The Florida Department of Economic Opportunity says personal information may have been taken from its unemployment benef...
by Dark Reading Staff, Dark Reading
July 26, 2021
1 min read
Article
Ransomware Is Top Concern for Many Security Pros: Report
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
July 23, 2021
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
by Dark Reading Staff, Dark Reading
July 23, 2021
2 min read
Article
Kaseya Offers Customers Decryption Key for Massive Ransomware Attack
The remote management software company will not disclose the source of the decryption key, but at least one company has ...
July 23, 2021
The remote management software company will not disclose the source of the decryption key, but at least one company has ...
by Robert Lemos, Contributing Writer
July 23, 2021
4 min read
Article
Memory Corruption Issues Lead 2021 CWE Top 25
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
July 22, 2021
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
by Jai Vijayan, Contributing Writer
July 22, 2021
5 min read
Article
What Does It Take to Secure Containers?
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especial...
July 22, 2021
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especial...
by Robert Lemos, Contributing Writer
July 22, 2021
5 min read
Article
Software Security: A Sounding Board for Needed Change
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
July 22, 2021
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
by Kevin E. Greene, Director of Security Solutions, Parasoft
July 22, 2021
6 min read
Article