Application Security News and Articles


Addressing The Growing Challenge of Generic Secrets: Beyond GitHub’s Push Protection

Generic secrets are hard to detect and are getting leaked more often. See how GitGuardian offers advanced protection where GitHub's push protection falls short. The post Addressing The Growing Challenge of Generic Secrets: Beyond GitHub’s ...

8,000 New WordPress Vulnerabilities Reported in 2024

Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek.

How to encrypt and secure sensitive files on macOS

Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors ...

Privacy Roundup: Week 11 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 9 MAR 2025 - 15 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due to ...

Immutable Cybersecurity Law #12

  “Never underestimate the simplicity of the attackers, nor the gullibility of the victims.” Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from simple ...

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths in symmetric cryptography are determined with respect to the brute force attacks ...

BSides Exeter 2024 – Red Track – Attacking AI: A Primer

Authors/Presenters: Achim Brucker Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

What is Identity Proofing and Why is it Important?

Identity proofing, or identity verification, is the process of verifying that someone is who they say they are. It ensures that the claimed digital identity exists in the real world and that the person claiming it is an authorized representative ...

Cloudflare boosts defenses against future quantum threats

Cloudflare announced that it is expanding end-to-end support for post-quantum cryptography to its Zero Trust Network Access solution. Available immediately, organizations can securely route communications from web browsers to corporate web ...

Software Developer vs. Software Engineer

Which One Do You Need for Your Software Dev Initiative? When businesses set out to build a software solution, one of the most common sources...Read More The post Software Developer vs. Software Engineer appeared first on ISHIR | Software ...

Bedrock Security’s metadata lake technology strengthens data security

Bedrock Security is declaring an end to data security without data visibility with the launch of its metadata lake technology — a centralized repository powering the patented Bedrock Platform. It provides continuous visibility across enterprise ...

New Akira Ransomware Decryptor Leans on Nvidia GPU Power

A software programmer developed a way to use brute force to break the encryption of the notorious Akira ransomware using GPU compute power and enabling some victims of the Linux-focused variant of the malware to regain their encrypted data ...

Bedrock Security Embraces Generative AI and Graph Technologies to Improve Data Security

Bedrock Security today revealed it has added generative artificial intelligence (GenAI) capabilities along with a metadata repository based on graph technologies to its data security platform. The post Bedrock Security Embraces Generative AI and ...

What Is Exposure Management and Why Does It Matter?

Each Monday, the Tenable Exposure Management Academy will provide the practical, real-world guidance you need to shift from vulnerability management to exposure management. In our first blog in this new series, we get you started with an overview ...

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks

Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek.

100 Car Dealerships Hit by Supply Chain Attack

The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek.

Six JDK 24 Features You Should Know About

I've chosen six new JDK 24 features that are particularly relevant and interesting for developers and those deploying Java. The post Six JDK 24 Features You Should Know About appeared first on Azul | Better Java Performance, Superior Java ...

Windsor Schools’ Proactive Approach to Cybersecurity and Student Safety

How Cloud Monitor and Content Filter Provide Visibility, Safety, and Peace of Mind at an Independent School Windsor Schools, a specialized K-12 learning program in New Jersey, is dedicated to providing a safe and supportive learning environment ...

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek.

GitHub project maintainers targeted with fake security alert

A phishing campaign targeting GitHub account owners has been trying to scare them with a fake security alert into allowing a malicious OAuth app access to their account and repositories. The fake security alert from GitHub GitHub users have taken ...