Application Security News and Articles


Building Trust with Solid NHIDR Approaches

Building Trust with Efficient NHIDR Approaches: An Imperative in Today’s Cybersecurity Landscape? Can implementing solid Non-Human Identity Detection and Response (NHIDR) approaches contribute toward building trust and enhancing cybersecurity ...

Choosing the Right Secrets Scanning Tools for Your Needs

How Can Secrets Scanning Tools Transform Your Cloud Security? The rise in digital transformations has led to an increase in the reliance on Non-Human Identities (NHIs) and Secret Security Management for securing cloud environments. We understand ...

News alert: INE Security highlights why hands-on labs can help accelerate CMMC 2.0 compliance

Cary, NC, Apr. 11, 2025, CyberNewswire — Defense contractors are facing increased pressure to meet the Department of Defense’s stringent Cybersecurity Maturity Model Certification (CMMC) 2.0 requirements ahead of 2025 compliance ...

BSidesLV24 – Breaking Ground – The Fault In Our Metrics: Rethinking How We Measure Detection & Response

Author/Presenter: Allyn Stott Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

How to Vet SaaS Apps Using FedRAMP Equivalency

As much as some people dislike it, the world is interconnected, and to operate a business successfully, you will have to use the products or services produced by other businesses. Under normal circumstances, this is fine. However, when you’re a ...

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know

If it feels like your entire cybersecurity program is once again operating on a geopolitical fault line, you're not imagining things. The intersection of global politics and cybersecurity has grown a whole lot messier — and more consequential ...

The Top CMMC Consultants: How to Choose the Right One for Your Business

Achieving CMMC (Cybersecurity Maturity Model Certification) compliance is essential for organizations aiming to secure contracts with the Department of Defense (DoD). Navigating the complexities of CMMC can be challenging, making the role of CMMC ...

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

The CVE-2025-22457 has already been exploited by a China-nexus hacking gang notorious for breaking into edge network devices. The post Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle appeared first on SecurityWeek.

Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices

A threat actor that has been using known old FortiOS vulnerabilities to breach FortiGate devices for years has also been leveraging a clever trick to maintain undetected read-only access to them after the original access vector was locked down, ...

Microsoft Moves Forward With Controversial Recall Feature

Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later. Privacy and security concerns forced the company to pull it ...

ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices

A high severity vulnerability in DICOM, the healthcare industry’s standard file protocol for medical imaging, has remained exploitable years after its initial disclosure. The flaw enables attackers to embed malicious code within legitimate ...

Navigating New Cyber-Physical System Security Regulations

Cyber-Physical Systems (CPS) are no longer the stuff of science fiction; they are woven into the fabric of our daily lives, organizations, and critical infrastructure. From smart grids managing our power to the connected cars we drive and the ...

BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective

Authors/Presenters: Oreen Livni Shein, Elad Pticha Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany ...

MCP Servers in AI IDEs: The Good, the Risky, and the Local Option

You’re using an AI-powered IDE like Cursor, letting it write boilerplate, explain code, and even debug.Continue reading on Medium »

Hackers Breach Morocco’s Social Security Database

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan “harassment” of Algeria on social media platforms. The post Hackers Breach Morocco’s Social Security Database appeared first on SecurityWeek.

A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy

Redundancy in secrets management introduces risks, as well as operational complexity, ultimately undermining overall security maturity. The post A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy appeared ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure your infrastructure. The safety net is shrinking, and those still waiting ...

Secure Coding : Introduction

The First Loophole: Insecure CodingContinue reading on Medium »

Vulnerability in OttoKit WordPress Plugin Exploited in the Wild

A vulnerability in the OttoKit WordPress plugin with over 100,000 active installations has been exploited in the wild. The post Vulnerability in OttoKit WordPress Plugin Exploited in the Wild appeared first on SecurityWeek.

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions

Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US.  The post In Other News: Scattered Spider Still Active, EncryptHub ...