Drozer: Open-source Android security assessment framework

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The solution enables the identification of security vulnerabilities in application… Continue reading Drozer: Open-source Android security assessment framework

BlueFlag Security Emerges From Stealth With $11.5M in Funding

BlueFlag Security emerges from stealth mode with $11.5 million in a seed funding round led by Maverick Ventures and Ten Eleven Ventures.
The post BlueFlag Security Emerges From Stealth With $11.5M in Funding appeared first on SecurityWeek.
Continue reading BlueFlag Security Emerges From Stealth With $11.5M in Funding

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

Organizations are knowingly releasing vulnerable applications

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for appli… Continue reading Organizations are knowingly releasing vulnerable applications

Cyber Insights 2024: APIs – A Clear, Present, and Future Danger

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
The post Cyber Insights 2024: APIs – A Clear, Present, and Future Danger appeared first on SecurityWeek.
Continue reading Cyber Insights 2024: APIs – A Clear, Present, and Future Danger