Application Security News and Articles


State Bar of Texas Says Personal Information Stolen in Ransomware Attack

The State Bar of Texas is notifying thousands of individuals that their personal information was stolen in a February ransomware attack. The post State Bar of Texas Says Personal Information Stolen in Ransomware Attack appeared first on SecurityWeek.

US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations

US and allied countries warn of threat actors using the “fast flux” technique to change DNS records and hide malicious servers’ locations. The post US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations ...

NetworkMiner 3.0 Released

I am very proud to announce the release of NetworkMiner 3.0 today! This version brings several new protocols as well as user interface improvements to NetworkMiner. We have also made significant changes under the hood, such as altering the ...

Oracle Confirms Cloud Hack

Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident. The post Oracle Confirms Cloud Hack appeared first on SecurityWeek.

Critical Apache Parquet Vulnerability Leads to Remote Code Execution

A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise. The post Critical Apache Parquet Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack

Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack. The post Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack appeared first on SecurityWeek.

Beyond SAST: Building a Multi-LLM Judge for Context-Aware Security Analysis

During my years in security engineering, I’ve watched teams struggle with the same problem: drowning in false positives from SAST tools…Continue reading on Medium »

The Ultimate Guide to Vulnerability Assessment

Vulnerability assessment is a process that identifies security weaknesses of any IT system, network, application, or cloud environment. It is a proactive approach to detect and fix security gaps before... The post The Ultimate Guide to ...

Why is Cloud Security Audit Important for Businesses?

Cloud security audit is essential to protect cloud-hosted applications and data from unauthorized access and theft. While cloud providers offer businesses the advantage of hosting apps and data with ease, this flexibility comes with security ...

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft

Microsoft is continuing to build on their AI cybersecurity strategy and this month announced the introduction of new agents in Microsoft Security Copilot. They are introducing agents for phishing triage, alert triage for data loss prevention and ...

Forward-thinking CISOs are shining a light on shadow IT

In this Help Net Security interview, Curtis Simpson, CISO and Chief Advocacy Officer at Armis, discusses how CISOs can balance security and innovation while managing the risks of shadow IT. Rather than focusing on restrictive policies, fostering ...

Connected cars drive into a cybersecurity crisis

Technology has entered all areas of life, and our cars are no exception. They have become computers on wheels, equipped with sensors, software, and connectivity that provide safety and comfort. However, like all technological innovations, this ...

Benefits from privacy investment are greater than the cost

Cisco released its 2025 Data Privacy Benchmark Study. The report looks at global trends in data privacy and how they affect businesses. The study gathered responses from 2,600 privacy and security experts in 12 countries. It highlights the need ...

Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing

Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing The post Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing appeared first on Security Boulevard.

Inside the AI-driven threat landscape

In this Help Net Security video, Nick Barter, Chief Strategy Officer at Nothreat, discusses how AI is no longer just a tool for defenders, it’s now a powerful weapon in the hands of attackers. With the adoption of generative AI, cyber threats ...

New infosec products of the week: April 4, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1touch.io, Bitsight, Bluefin, CyberQP, and Exabeam. Exabeam Nova accelerates threat detection and response By correlating multiple detections within a ...

The Fast Flux DNS Threat: A Call to Action Against a Geopolitical and Hacktivist Nightmare

Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, ...

5 Reasons to Secure Firmware in Financial Services Organizations

The post 5 Reasons to Secure Firmware in Financial Services Organizations appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post 5 Reasons to Secure Firmware in Financial Services Organizations appeared first ...

Get Excited About Innovations in IAM

Why Should You Be Excited About Innovations in Identity and Access Management (IAM)? If you’re a Cybersecurity professional or CISO, you understand the value of Non-Human Identities (NHI) and Secrets Management. The burning question, then, is ...

How to Protect Your Spring Sale from Bots

See how a top retailer protected revenue and customer trust during a major spring sale — with faster checkouts and zero downtime. The post How to Protect Your Spring Sale from Bots appeared first on Security Boulevard.