Application Security News and Articles


T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit

T-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek.

Business Email Compromise, ACH Transactions, and Liability

Business Email Compromise (BEC) fraud represents one of the most insidious threats facing businesses and individuals today. The post Business Email Compromise, ACH Transactions, and Liability appeared first on Security Boulevard.

More Solar System Vulnerabilities Expose Power Grids to Hacking 

Forescout has found dozens of vulnerabilities in solar power systems from Sungrow, Growatt and SMA. The post More Solar System Vulnerabilities Expose Power Grids to Hacking  appeared first on SecurityWeek.

AI Security Firm Straiker Emerges From Stealth With $21M in Funding

Straiker has emerged from stealth mode with a solution designed to help enterprises secure AI agents and applications. The post AI Security Firm Straiker Emerges From Stealth With $21M in Funding appeared first on SecurityWeek.

Famous Data Breaches & Phishing Attacks: What We Can Learn

Explore major data breaches and phishing attacks, their impact, and key lessons. Learn how companies fell victim and how to protect against such threats. The post Famous Data Breaches & Phishing Attacks: What We Can Learn appeared first on ...

DPRK IT Worker Scam: Mitigation Steps for Hiring Teams

Nisos DPRK IT Worker Scam: Mitigation Steps for Hiring Teams Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Singaporean, Turkish, Finish and US nationals with the goal of obtaining employment in remote ...

runZero’s expanded platform offers new approach to detecting and prioritizing risk

runZero releases new product capabilities, welcomes executive leadership with deep industry expertise, and gains channel momentum. runZero’s expanded platform offers a new approach to effectively manage the risk lifecycle, enabling security ...

The FFIEC’s Origins and Purpose for Banking Industry

The Federal Financial Institutions Examination Council (FFIEC) plays a pivotal role in ensuring the safety, soundness, and efficiency of financial institutions in the United States. Founded in 1979, the FFIEC operates as an interagency regulatory ...

RFID Hacking: Exploring Vulnerabilities, Testing Methods, and Protection Strategies

Radio-Frequency Identification (RFID) technology is everywhere—powering everything from contactless payments and inventory tracking to access control systems. But while RFID systems makes life more convenient, it also introduces serious ...

GetReal Security platform combats AI-fueled attacks

GetReal Security launched unified platform to help enterprises, government agencies and media organizations manage risk and mitigate threats from the growing presence of AI-fueled attacks. The platform brings together GetReal’s products and ...

My enlightening journey through week 6 of the AWS cohort#7

A Quirky Ice Breaker and Warm BeginningsContinue reading on Medium »

Kubernetes Ingress-nginx Remote Code Execution Vulnerability (CVE-2025-1974)

Overview Recently, NSFOCUS CERT detected that Kubernetes issued a security announcement and fixed the Kubernetes Ingress-nginx remote code execution vulnerability (CVE-2025-1974). The Ingress controller deployed in Kubernetes Pod can be accessed ...

The hidden costs of security tool bloat and how to fix it

In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on how deep ...

Cyber insurance isn’t always what it seems

Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens. ...

Hottest cybersecurity open-source tools of the month: March 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Hetty: Open-source HTTP toolkit for security research Hetty is an open-source HTTP ...

ETSI releases security standard for the quantum future

ETSI launched post-quantum security standard to guarantee the protection of critical data and communications in the future. The specification “Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies” (ETSI TS 104 015) ...

Identity security: A critical defense in 2025’s threat landscape

The traditional perimeter is no longer what protects our critical information and systems. In 2025, securing data is dependent on identity. With distributed multi-cloud, multi-IDP environments, the business world is up against a stark reality: ...

Legit Announces New Vulnerability Prevention Capabilities

Get details on Legit's new capabilities that allow AppSec teams to prevent introducing vulnerabilities.. The post Legit Announces New Vulnerability Prevention Capabilities appeared first on Security Boulevard.

How can I align our NHI management with GDPR and other standards?

Is Your NHI Management GDPR Compliant? It isn’t just humans who have identities, but machines as well. In-depth understanding and control over NHIs provide organizations with an upper hand in maintaining stringent cybersecurity measures. But ...

Which frameworks assist in ensuring compliance for NHIs?

Why Compliance Frameworks are Crucial for NHIs? Could the answer to your organization’s cybersecurity woes lie in Non-Human Identities (NHIs)? The management of NHIs and their secrets has emerged as a key facet of cybersecurity strategy, with ...