Application Security News and Articles


WinRAR MotW bypass flaw fixed, update ASAP (CVE-2025-31334)

WinRAR users, upgrade your software as soon as possible: a vulnerability (CVE-2025-31334) that could allow attackers to bypass Windows’ Mark of the Web (MotW) security warning and execute arbitrary code on your machine has been fixed in ...

The Fastest Way to Secure Your APIs? We’ve Got That Covered with CrowdStrike

APIs are the backbone of modern apps, but they also introduce some serious security risks. Attackers are constantly on the lookout for vulnerable APIs, shadow APIs, zombie APIs, and exposed sensitive data—all of which are tough to track if you ...

NIST Puts Pre-2018 CVEs on Back Burner as It Works to Clear Backlog

NIST has marked pre-2018 CVEs in NVD as ‘Deferred’ and will no longer spend resources on enriching them. The post NIST Puts Pre-2018 CVEs on Back Burner as It Works to Clear Backlog appeared first on SecurityWeek.

How to Make SaaS Web Apps PCI DSS Compliant

The post How to Make SaaS Web Apps PCI DSS Compliant appeared first on Feroot Security. The post How to Make SaaS Web Apps PCI DSS Compliant appeared first on Security Boulevard.

Port of Seattle Says 90,000 People Impacted by Ransomware Attack

The Port of Seattle says the personal information of 90,000 individuals was stolen in an August 2024 ransomware attack. The post Port of Seattle Says 90,000 People Impacted by Ransomware Attack appeared first on SecurityWeek.

Suspected Scattered Spider Hacker Pleads Guilty

A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty. The post Suspected Scattered Spider Hacker Pleads Guilty appeared first on SecurityWeek.

DeepSeek Breach Yet Again Sheds Light on Dangers of AI 

AI isn’t waiting for security teams to catch up. It’s running full steam ahead, without any regard for what may stand in its way.  The recent security debacle surrounding DeepSeek — where Wiz researchers uncovered extensive ...

Exploring the EU Cybersecurity Certification Scheme: A Guide to Common Criteria

What is the EU Cybersecurity Certification Scheme? The EU Cybersecurity Certification Scheme is designed to simplify and harmonize cybersecurity certifications across the EU. With varying national-level rules and regulations creating barriers to ...

Corporate Layoffs Put Company IP at Risk 

With corporate layoffs and government workforce reductions frequently making headlines, leaders often underestimate the potential for massive data loss and intellectual property liability. The post Corporate Layoffs Put Company IP at Risk  ...

What are Verified Mark Certificates & how do they help authenticate emails?

Digital certificates are a vital part of securing online communications, including email. While they primarily safeguard sensitive data, they can also enhance trust and brand recognition. Verified mark certificates (VMCs) are a specialized type ...

N-able Vulnerability Management identifies vulnerabilities across all major operating systems

N-able announced the upcoming launch of its Vulnerability Management feature for their UEM (Unified Endpoint Management) products, N-central and N-sight. The new built-in feature will allow organizations to identify, prioritize, remediate, and ...

Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer

Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer San Mateo, CA – April 7, 2024 –... The post Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer appeared first on Symmetry ...

CISOs battle security platform fatigue

It starts with good intentions. A tool to stop phishing. Another to monitor endpoints. One more for cloud workloads. Soon, a well-meaning CISO finds themselves managing dozens of products across teams, each with its own dashboard, alerts, and ...

The shift to identity-first security and why it matters

In this Help Net Security interview, Arun Shrestha, CEO at BeyondID, discusses how AI is transforming secure access management for both attackers and defenders. He discusses the shift toward identity-first security, and the role of contextual and ...

YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection

YES3 Scanner is an open-source tool that scans and analyzes 10+ different configuration items for your S3 buckets in AWS. This includes access such as public access via ACLs and bucket policies – including the complex combinations of ...

The 23andMe Collapse, Signal Gate Fallout

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on ...

The rise of compromised LLM attacks

In this Help Net Security video, Sohrob Kazerounian, Distinguished AI Researcher at Vectra AI, discusses how the ongoing rapid adoption of LLM-based applications has already introduced new cybersecurity risks. These vulnerabilities will not be in ...

Industry Moves for the week of April 7, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of April 7, 2025. Stay updated with the latest industry trends and shifts.

Achieving Independent Control Over NHIs

Is Independent Control over Non-Human Identities Possible? The challenge of managing Non-Human Identities (NHIs) effectively is significantly increasing. With the rapid expansion of cloud technologies and the multiplying scale of machine ...

NHI Solutions That Fit Your Budget

Why Non-Human Identities (NHIs) and Secrets Management Matter? Have you ever considered how seemingly non-interactive entities can pose a significant threat to your business’ security? NHIs and secrets management are two terms that are gaining ...