Application Security News and Articles


39 Million Secrets Leaked on GitHub in 2024

GitHub has announced new capabilities to help organizations and developers keep secrets in their code protected. The post 39 Million Secrets Leaked on GitHub in 2024 appeared first on SecurityWeek.

Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability 

Two CVEs now exist for an actively exploited CrushFTP vulnerability and much of the security industry is using the ‘wrong one’. The post Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability  appeared first on SecurityWeek.

Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks

Cisco fixes two high-severity denial-of-service vulnerabilities in Meraki devices and Enterprise Chat and Email. The post Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks appeared first on SecurityWeek.

Google Released Second Fix for Quick Share Flaws After Patch Bypass

Google’s patches for Quick Share for Windows vulnerabilities leading to remote code execution were incomplete and could be easily bypassed. The post Google Released Second Fix for Quick Share Flaws After Patch Bypass appeared first on SecurityWeek.

1touch.io helps organizations safeguard sensitive data

1touch.io launched the next-generation Enterprise Data Security Posture Management (DSPM) platform, a solution designed specifically for hybrid, multi-cloud, on-premises, and mainframe environments. By integrating continuous data discovery, ...

Corgea BLAST uncovers hidden vulnerabilities in code

Corgea launches BLAST (Business Logic Application Testing), its AI-driven cybersecurity platform designed to address the risks associated with hidden code vulnerabilities, human error, and security flaws introduced by AI-assisted coding tools. ...

Bluefin simplifies network tokenization access and management for merchants

Bluefin announced the addition of network tokenization capabilities to its ShieldConex Tokenization as a Service and Orchestration platforms, enabling merchants to directly provision network-issued payment tokens from card brands such as Visa, ...

CyberQP launches Zero Trust Helpdesk Security Platform

CyberQP has launched its Zero Trust Helpdesk Security Platform—combining QGuard for Privileged Access Management (PAM) and QDesk for End-User Access Management (EUAM). This unified solution helps IT teams reduce risk, improve efficiency, and ...

Defense in Depth is Broken – It’s Time to Rethink Cybersecurity 

Breaking down why traditional defense-in-depth strategies fail and what security teams must do to truly outsmart attackers.  The post Defense in Depth is Broken – It’s Time to Rethink Cybersecurity  appeared first on Security Boulevard.

The Evolution of Smishing: 3 Ways to Detect and Prevent Attacks 

Smishing has evolved dramatically in recent years, with increased attack frequency and a much higher quality of the fraudulent landing pages.   The post The Evolution of Smishing: 3 Ways to Detect and Prevent Attacks  appeared first on ...

Beware fake AutoCAD, SketchUp sites dropping malware

Malware peddlers are saddling users with the TookPS downloader and the Lapmon and TeviRat backdoors via malicious sites that mimic official ones and ostensibly offer legitimate software for download, Kaspersky researchers have warned. Malicious ...

Vite Arbitrary File Read Vulnerability (CVE-2025-31125)

Overview Recently, NSFOCUS CERT detected that Vite issued a security bulletin to fix the Vite arbitrary file read vulnerability (CVE-2025-31125); Because the Vite development server does not strictly verify the path when processing URL requests, ...

7 ways to get C-suite buy-in on that new cybersecurity tool

You’re in the middle of a sprint, juggling deadlines, debugging code, fine-tuning pipelines, and then it happens—you stumble across the perfect cybersecurity tool. It promises to eliminate secrets in logs, reduce risks in CI/CD pipelines, and ...

Building a cybersecurity strategy that survives disruption

Cybersecurity isn’t what it used to be. Attackers are moving quicker, disruptions happen all the time, and many security plans built for more predictable times just can’t keep up. With everything from ransomware to geopolitical threats to ...

Cybercriminals exfiltrate data in just three days

In 56% of Sophos managed detection and response (MDR) and incident response (IR) cases, attackers gained initial access to networks by exploiting external remote services, including edge devices such as firewalls and VPNs, and by leveraging valid ...

Navigating Saudi Arabia’s Personal Data Protection Law (PDPL): A Guide to Compliance

Navigating Saudi Arabia's Personal Data Protection Law (PDPL): A Guide to Compliance madhav Thu, 04/03/2025 - 04:30 The Kingdom of Saudi Arabia (KSA) has taken a significant step towards bolstering data protection with its Personal Data ...

Open-source malware doubles, data exfiltration attacks dominate

There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according to Sonatype. Quarterly breakdown (Source: Sonatype) The Q1 figure ...

New UI for NSFOCUS WAF V6.0R09F00 – Experience a Smoother Site Management

NSFOCUS understands that the Security Operations team is facing increasing threats to their web applications and workloads are rising accordingly, a simple yet easy-to-use WAF has become more important than ever for effective Security Operations. ...

Review: Zero to Engineer

Zero to Engineer is a practical guide for anyone looking to launch a career in information technology without a traditional college degree. The book draws from the author’s unlikely journey – from being expelled from high school to ...

An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain on Quick Share

See how a SafeBreach Labs researcher discovered a bypass for a fix to a critical vulnerability they previously reported in Google’s Quick Share data transfer utility. The post An Update on QuickShell: Sharing Is Caring about an RCE Attack Chain ...