Application Security News and Articles


CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It

by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re mocking your defenses. In a recent attack spotted by the Source Defense Cyber Research team, a ...

Time to Migrate from On-Prem to Cloud? What You Need to Know

Migrating from on-premises infrastructure to the cloud is an important step for any business seeking to modernize operations, improve scalability, and (potentially) reduce costs. Using Amazon Elastic Kubernetes Service (EKS), Microsoft Azure ...

How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities

Learn more about how Legit is helping enterprises prevent vulnerabilities in their SDLCs. The post How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities appeared first on Security Boulevard.

What to Look for in Application Security Posture Management (ASPM)

Get details on the key capabilities for an ASPM platform.  The post What to Look for in Application Security Posture Management (ASPM) appeared first on Security Boulevard.

The Alternative to Acunetix: Escape DAST

Looking for an Acunetix alternative? Discover how Escape DAST offers seamless app and API security testing, modern integrations, and scalability. The post The Alternative to Acunetix: Escape DAST appeared first on Security Boulevard.

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects

Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme. The post Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects appeared first on SecurityWeek.

Your Network Is Showing – Time to Go Stealth

The Old Guard: Firewalls, VPNs and Exposed Control Planes Cyberattacks have evolved beyond the perimeter. No longer limited to opportunistic breaches, attackers are now executing coordinated campaigns that target the very foundations of ...

Attack Surface Management vs. Vulnerability Management

The post Attack Surface Management vs. Vulnerability Management appeared first on AI Security Automation. The post Attack Surface Management vs. Vulnerability Management appeared first on Security Boulevard.

Introducing Rust in SonarQube

The popularity of the Rust programming language is growing. Rustaceans have been asking for SonarQube to support Rust and now it's here! The post Introducing Rust in SonarQube appeared first on Security Boulevard.

Escape Joins the AWS ISV Accelerate Program to Drive the Future of DAST in Enterprises

A couple of weeks before the RSA conference, we're thrilled to share that Escape has officially joined the AWS ISV Accelerate Program! This is a huge milestone for us, and it marks an exciting new chapter in our mission to transform how ...

Emulating the Stealthy StrelaStealer Malware

AttackIQ has released three new attack graphs designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with StrelaStealer observed in its most recent activities, enabling defenders to test and validate their detection and ...

How to Stay GDPR-Compliant Without Blocking Business Productivity

The post How to Stay GDPR-Compliant Without Blocking Business Productivity appeared first on Votiro. The post How to Stay GDPR-Compliant Without Blocking Business Productivity appeared first on Security Boulevard.

SafeLine Bot Management: Self-hosted alternative to Cloudflare

Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While Cloudflare Bot Management is a powerful cloud-native solution that leverages massive ...

Demystifying Security Posture Management

While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity. The post Demystifying Security Posture Management appeared first on SecurityWeek.

Vulnerabilities Patched in Atlassian, Cisco Products

Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs. The post Vulnerabilities Patched in Atlassian, Cisco Products appeared first on SecurityWeek.

Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)

CVE-2025-24054, a Windows NTLM hash disclosure vulnerability that Microsoft has issued patches for last month, has been leveraged by threat actors in campaigns targeting government and private institutions in Poland and Romania. “Active ...

Critical Erlang/OTP SSH Flaw Exposes Many Devices to Remote Hacking

Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH. The post Critical Erlang/OTP SSH Flaw Exposes Many Devices to Remote Hacking appeared first on SecurityWeek.

The FTC Is Watching: GoDaddy’s Settlement Sends a Clear Message on API Security

In today’s rapidly changing digital environment, APIs play a crucial role in modern business, facilitating smooth connectivity and data sharing. Yet, this interconnected nature brings significant security and privacy risks, as evidenced by the ...

Why ‘One Community’ Resonates in Cybersecurity

Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment. The post Why ‘One Community’ Resonates in Cybersecurity appeared first on SecurityWeek.

Cross-Site Scripting (XSS): Understanding the Threat and Its Variants

Cross‑Site Scripting (XSS) is a client‑side code injection attack in which an attacker injects malicious scripts into content delivered to…Continue reading on Medium »