Application Security Trends

Traditional security is well past its expiration date. Learn about the latest trends in AppSec in these posts, from DevOps to SAST and everything in between.
wikileaks-logo

What’s HOT in Application Security Vol #25

Aug 20, 2012 By asaphs | WikiLeaks crippled by DDoS attacks
A group who call themselves AntiLeaks has claimed responsibility for the crippling hack on the famous site WikiLeaks and its founder Julian Assange.  WikiLinks claimed that that their servers were attacked by 10 Gbps of false traffic per second. The attack was also reported to be a sustained one lasting a total of 9 days. If this is true, it may also have been one of the longest sustained DDoS attacks on record.

Read More »
budget-savings-m

What’s HOT in Application Security Vol#23

Aug 06, 2012 By asaphs | Top security expert notes hackers aiming for cross-platform vulnerabilities
An increasing amount of hackers are aiming to use cross-platform malware to attack both Microsoft and Apple application vulnerabilities. Hackers tend to favor third party applications that run on both Macs and Windows such as Adobe PDF, Adobe Flash, Java as well as others.

Read More »
Anonymous-Mask

What’s HOT in Application Security Vol #22

Jul 31, 2012 By asaphs | Game publisher Ubisoft in hot water due to serious security threat
Ubisoft is a household name synonymous with fantastic, exciting games and also with a zero tolerance approach to game piracy. The company has been plagued with problems recently after the Uplay network has been absolutely overloaded with issues; outages, technical issues and now security!

Read More »
darpa

What’s Hot in Application Security Vol #21

Jul 23, 2012 By asaphs | DARPA funded hacking device ready for release
The Defense Advanced Projects Research Agency (DARPA) has just finished funding a new device called The Power Pwn. The new device which is cunningly concealed as a regular power strip is anything but! The new device is actually a Hacking tool for launching remotely-activated WI-Fi, Bluetooth and Ethernet attacks.

Read More »

What’s HOT in Application Security Vol #20

Jul 16, 2012 By Administrator | Yahoo left red-faced after SQL injection vulnerability reveals nearly half a million passwords!
A hacking group who name themselves ‘DD3Ds Company’ have, within the last few days leaked 453,492 yahoo text passwords for Yahoo accounts. DD3Ds Company now claim that they attained the passwords by means of SQL injection against a poorly secured Yahoo subdomain. Security experts have named the it as Yahoo Voices.

Read More »

What’s HOT in Application Security Vol #19

Jul 09, 2012 By Administrator | Cyber Attacks on ATM and online banking are at an all time high
Cyber Attacks which are aimed at online banking applications are at an all time high, according to several security experts. Unsurprisingly, almost one third of all attacks were aimed at banks which reside in the Gulf, where the banks are swelling with oil money and where small amounts of money missing from accounts are likely to go un-noticed.

Read More »
Application-Security-News-Thumbnail

What’s HOT in Application Security Vol #18

Jul 02, 2012 By Administrator | What are the Top Flaws in Web Applications?
When it comes to security, web applications are consistently the most vulnerable to penetration. Here are some of the top flaws in web applications:

Read More »
Application-Security-News-Thumbnail

What’s HOT in Application Security Vol #17

Jun 25, 2012 By Administrator | PayPal to Grant Money for Reported Vulnerabilities
Asking hackers to report security breaches they find without being rewarded doesn’t seem to work. There has to be some kind of an incentive. EBay, Amazon, Sony and now PayPal will provide security researchers who discover vulnerabilities in its website with money prizes. This encourages hackers to search for security breaches but at the same time, instead of using the vulnerabilities for illegal intentions they could make some money, disclose the vulnerabilities that they find on to their own personal blogs, and possibly make a name for themselves.

Read More »

What’s HOT in Application Security Vol #15

Jun 11, 2012 By Administrator | 5 of the most famous hacks, ever! 
Hacking has pretty much been a concept which has been around since as long as the internet has. Sometimes the criminals go after governments to make political statements, like the recent hacks seen against the Chinese Government, sometimes it’s all about an online cyber war, as was seen in the Israel vs Iran Stuxnet fiasco or hacking is the result of pure and simple financial gain, as was seen in the recent Sony breach.

Read More »

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.

SUBSCRIBE