Application Security News and Articles


How DataDome Instantly Blocked a 28M-Request Flash DDoS Attack For a $3B E-Commerce Leader

DataDome stopped a 28M-request Flash DDoS in real time—no downtime or disruption for the $3B e-commerce platform under attack. The post How DataDome Instantly Blocked a 28M-Request Flash DDoS Attack For a $3B E-Commerce Leader appeared first on ...

BSidesLV24 – HireGround – You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity

Author/Presenter: Anthony Hendricks Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Protecting Users: Prevent and Stop Cyberthreats Before They Start With Kaseya 365 User

Discover how Kaseya 365 User enhances end-user protection and prevents threats before they cause damage. The post Protecting Users: Prevent and Stop Cyberthreats Before They Start With Kaseya 365 User appeared first on Kaseya. The post Protecting ...

Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)

A suspected Chinese APT group has exploited CVE-2025-22457 – a buffer overflow bug that was previously thought not to be exploitable – to compromise appliances running Ivanti Connect Secure (ICS) 22.7R2.5 or earlier or Pulse Connect ...

Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances 

Ivanti misdiagnoses a remote code execution vulnerability and Mandiant reports that Chinese hackers are launching in-the-wild exploits. The post Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances  appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Rock Identification’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Rock Identification’ appeared first on Security Boulevard.

CISO Transformation: It’s Time for a New Mental Model

CISO mind maps are helpful, but they reinforce a tactical view of security. Learn why modern CISOs need a new mental model focused on strategy, value, and board-level impact. The post CISO Transformation: It’s Time for a New Mental Model first ...

Stopping MFA Fatigue Attacks Before They Start: Securing Your Entry Points

MFA Fatigue Attacks on the Rise Yet another challenge is undermining the effectiveness of MFA: MFA fatigue attacks. In an MFA fatigue attack (sometimes also referred to as an “MFA bombing” or “push bombing” attack), a hacker who already ...

Halo ITSM Vulnerability Exposed Organizations to Remote Hacking

An unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data. The post Halo ITSM Vulnerability Exposed Organizations to Remote Hacking appeared first on SecurityWeek.

Insider Threats Make the Case for Data-centric Security

CISOs appear to be spending more on mitigating insider risk. Reports suggest 16.5% of cybersecurity budgets are now devoted to it, roughly double the figure of a year ago. To understand why, just read the latest threat intelligence from Google, ...

Securing OT Environments with Zero Trust: A Joint Approach by ColorTokens and Claroty

The Growing Cybersecurity Threat in OT Environments As industries undergo digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) is fundamentally reshaping the landscape of critical infrastructure. ...

BSidesLV24 – HireGround – Behavioral Interviewee-ing: Inverting the Corporate Interview to Get You Hired

Author/Presenter: Jason Fredrickson Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

App Stores OK’ed VPNs Run by China PLA

Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads. The post App Stores OK’ed VPNs Run by China PLA appeared first on Security Boulevard.

How To Harden GitLab Permissions with Tenable

If your organization uses GitLab for managing your software development lifecycle, you must ensure you’re not misconfiguring the permissions of this open source DevSecOps platform. Doing so can expose your source code, along with sensitive ...

Bitsight Identity Intelligence provides visibility into compromised accounts

Bitsight launched Bitsight Identity Intelligence, a new, standalone threat intelligence module designed to help security teams detect compromised credentials, prevent unauthorized access, and proactively mitigate risk across their extended attack ...

Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)

CVE-2024-20439, a static credential vulnerability in the Cisco Smart Licensing Utility, is being exploited by attackers in the wild, CISA has confirmed on Monday by adding the flaw to its Known Exploited Vulnerabilities catalog. Cisco has ...

Hunters International Ransomware Gang Rebranding, Shifting Focus

The notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion. The post Hunters International Ransomware Gang Rebranding, Shifting Focus appeared first on SecurityWeek.

Cequence Marks Another Milestone with AWS Security Competency Achievement

As businesses embrace the cloud, their attack surface expands accordingly. Cloud workloads are built on APIs, and Cequence’s expertise in API security and bot management means the company and its products are uniquely positioned to protect ...

Identities and IAM Trends: Q&A With a Saviynt Identity Expert

Author: Ehud Amiri, SVP Product Management, Savyint How will the threat to identities change over the coming year? AI will […] The post Identities and IAM Trends: Q&A With a Saviynt Identity Expert appeared first on Security Boulevard.

Google Makes Sending Encrypted Emails Easier for Gmail Users

Google is making it easier for Gmail users to send end-to-end encrypted (E2EE) emails to anyone by adopting a process that does away with complex options like S/MIME and instead uses encrypted keys that are controlled by the sender. The post ...