Application Security News and Articles


Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year. The post Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 appeared first on SecurityWeek.

What Is Cybersecurity Risk? A Guide to Protect Your Business

Cybersecurity risk affects every business. A single cyber incident, such as a data breach or ransomware attack, can disrupt operations, expose sensitive data, and create costly compliance issues. The challenge is knowing which risks pose the ...

What Is Secure Coding? Best Practices and Techniques to Apply

Software vulnerabilities pose serious security and business risks. Writing secure code prevents these issues by integrating security into the development process. Instead of fixing vulnerabilities after deployment, developers apply secure coding ...

SafeBreach Coverage for US CERT AA25-071A (Medusa Ransomware)

SafeBreach has added coverage against the Medusa ransomware variant, which has been used to target critical infrastructure organizations, demand ransom payment, and threaten to leak stolen data. The post SafeBreach Coverage for US CERT AA25-071A ...

AD Lite Password Auditor Report: Key Insights and Data

2024 Enzoic AD Lite Password Auditor Report In an era where cyber threats continue to evolve, password security remains one of the most critical yet often overlooked components of an organization’s security posture. Enzoic’s 2024 AD Lite ...

FreeType Zero-Day Being Exploited in the Wild

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.  The post FreeType Zero-Day Being Exploited in the Wild appeared first on SecurityWeek.

Silk Typhoon Targeting IT Supply Chains and Network Devices, Microsoft Reports

Microsoft Threat Intelligence has issued new reporting about tactics being used by Silk Typhoon (also called APT27 or HAFNIUM by some researchers). Silk Typhoon is a Chinese espionage group, observed targeting Microsoft Exchange Servers in 2021, ...

Randall Munroe’s XKCD ‘Water Damage’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Damage’ appeared first on Security Boulevard.

Cisco Patches 10 Vulnerabilities in IOS XR

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs. The post Cisco Patches 10 Vulnerabilities in IOS XR appeared first on SecurityWeek.

How to secure your personal metadata from online trackers

When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, ...

Moving Past Compensating Controls: The Long-Term Value of Tokenization for PCI DSS

With the deadline for PCI DSS 4.0 compliance just around the corner, it’s decision time for organizations. For many, compensating controls are a godsend, introducing a degree of flexibility into what is otherwise a rigorous, demanding and ...

Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity

The water industry provides the drinking water and wastewater systems we all use every day. As such, it counts as a key piece of the nation’s critical infrastructure. But it is also in the crosshairs of a dangerous new wave of cyberattacks, ...

ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference

We had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged at the Venetian Convention Center and Ceasar’s ...

PCI DSS SAQ A-EP: Secure Your E-Commerce Payments

The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Feroot Security. The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Security Boulevard.

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms. The post Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign appeared first on SecurityWeek.

BSides Exeter 2024 – Blue Track – Suppliers: Trust, But Verify

Author/Presenter: Todd Gifford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering. The post Microsoft Warns of Hospitality Sector Attacks Involving ClickFix appeared first on SecurityWeek.

Untangle AWS IAM Policy Logic and Move Toward Least Privilege

AWS Identity and Access Management (IAM) is powerful, but it is also one of the most complex and frustrating aspects of cloud security. Security teams want to enforce least privilege, but AWS IAM’s additive permissions model, combined with ...

Hackers Use Trump’s Coin, Binance’s Name in Crypto Phishing Scam

Threat actors are running an email phishing scam to entice victims to install Binance software in hopes of collecting TRUMP coins. However, if they try, they instead get the ConnectWise RAT installed on their systems, which could let the malware ...

OWASP supply chain security cheat sheet: 5 key action items

Securing the software supply chain is a complex task. For one, it spans the entire software development lifecycle (SDLC). For another, generative AI coding tools and modern development practices are increasing software complexity. The result: ...