Application Security News and Articles


Hands-On with Amazon Inspector’s Latest Feature: Code Security

Seamlessly integrates with GitHub to automatically detect code vulnerabilities — perfect for developers new to static analysis.Continue reading on Medium »

The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive

The $4.88 million question isn't really whether organizations can afford to implement passwordless authentication—it's whether they can afford not to. With breach costs rising 10% annually, credential-based attacks representing the primary ...

PCI DSS 4.0.1: What Changed and How is this the Next Step for Universal MFA

As the transition period for PCI DSS 4.0 draws to a close on March 31, 2025, PCI DSS 4.0.1 stands as the current version of the standard. More importantly, the March 31, 2025 deadline for full compliance with all new and customized PCI DSS 4.0 ...

LinuxFest Northwest: The Geology of Open Source

Author/Presenter: Hazel Weakly (Nivenly Foundation; Director, Haskell Foundation; Infrastructure Witch of Hachyderm) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

DoJ, FBI, USSS yoinked USDT: Pretty girls plus investment fraud equals forfeiture recovery (eventually). The post US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency appeared first on Security Boulevard.

Tonic Validate is now on GitHub Marketplace! (Part 2)

Tonic Validate is a free, open-source library for evaluating RAG and LLM based applications. We recently announced a new listing on GitHub Marketplace that provides a GitHub Actions template to run Tonic Validate against code changes on every ...

Tonic Validate is now available on GitHub Marketplace!

Tonic Validate, our free, open-source library for evaluating RAG and LLM-based applications, can be run entirely as a GitHub Action. And it's now available for quick deployment on GitHub Marketplace! The post Tonic Validate is now available on ...

Tonic.ai Achieves HIPAA Compliance Certification, Ensuring Enhanced Security for Protected Health Information

We are proud to announce that we have successfully completed our HIPAA certification, marking a significant milestone in our commitment to data security and privacy. This achievement underscores our dedication to providing secure data ...

Steam Phishing: popular as ever

A month or so ago a friend of mine received the following message on Steam from someone in their Friends list (they were already friends): Figure 1 - 'this is for you'                                The two links are ...

CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin

Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity ...

Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025

Imagine if every doctor had an invisible assistant, one that quietly listens during every patient interaction, captures every detail with precision, and instantly writes the...Read More The post Top 7 Ambient Listening AI Tools Revolutionizing ...

LinuxFest Northwest: The Intersectionality Of Human Psychology, Security And The Era Of AI And Misinfo

Author/Presenter: Autumn Nash (Product Manager At Microsoft, Specializing In Linux Security Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the ...

JavaScript Protector Pro: The Ultimate Tool to Obfuscate & Secure Your JavaScript Code

In today’s digital age, JavaScript is everywhere — powering everything from sleek single-page applications to complex web dashboards. But…Continue reading on Medium »

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer. The post In Other News: Viasat Hacked by China, Washington Post ...

Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds

Check out highlights from Tenable’s “2025 Cloud Security Risk Report,” which delves into the critical risk from insecure cloud configurations. Plus, Google reveals a Russia-sponsored social engineering campaign that targeted prominent ...

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds. The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.

Your SOC Doesn’t Need More Alerts – It Needs a Brain

The phrase “alert fatigue” has become a mainstay in cybersecurity conversations. But behind the flood of findings, alerts, vulnerabilities, and compliance gaps lies a deeper problem: the security context crisis. Security teams aren’t just ...

Microsoft boosts default security of Windows 365 Cloud PCs

Windows 365 Cloud PCs now come with new default settings aimed at preventing / minimizing data exfiltration and malicious exploits, Microsoft has announced. Windows 365 Cloud PCs are Azure (i.e., Windows 365 service)-hosted virtual Windows PCs ...

Godfather Android Trojan Creates Sandbox on Infected Devices

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.

Motors Theme Vulnerability Exploited to Hack WordPress Websites

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords. The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek.