Application Security News and Articles


Application Attacks Rise Significantly | February Attack Data | Contrast Security

The number of attacks on individual applications are up significantly month to month, according to research from Contrast Security. The Contrast Labs team found that, on average, applications faced 77 real attacks in February — “real” ...

DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware

Tenable Research examines DeepSeek R1 and its capability to develop malware, such as a keylogger and ransomware. We found it provides a useful starting point, but requires additional prompting and debugging. Background As generative artificial ...

DeepSeek’s Malware-Generation Capabilities Put to Test

Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek.

North Korean Hackers Distributed Android Spyware via Google Play

The North Korea-linked APT37 has been observed targeting Android users with spyware distributed via Google Play. The post North Korean Hackers Distributed Android Spyware via Google Play appeared first on SecurityWeek.

DFARS 101: Protecting CUI in Defense Contracts

If your company handles Controlled Unclassified Information (CUI) for defense contracts, you’ve likely encountered DFARS and its key cybersecurity clauses: 7012, 7019, 7020, and 7021. But what exactly is DFARS, why is compliance crucial, and ...

Medusa Ransomware Made 300 Critical Infrastructure Victims

CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations. The post Medusa Ransomware Made 300 Critical Infrastructure Victims appeared first on SecurityWeek.

Suspected North Korea Group Targets Android Devices with Spyware

A North Korea-backed threat group, APT37, disguised KoSpy as utility apps in Google Play to infect Android devices, using the spyware for such activities as gathering sensitive information, tracking locations, capturing screenshots, recording ...

Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution

Organizations can align their processes with one of two global industry standards for self-assessment and security maturity—BSIMM and OWASP SAMM. The post Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development ...

QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer

QuamCore’s secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat. The post QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer appeared first on SecurityWeek.

NYDFS Cybersecurity Regulation: Dates, Facts and Requirements

New York, the city that never sleeps, is also the city that takes cybersecurity very seriously. If you’re part of the financial services ecosystem here—or interact with businesses regulated by the New York State Department of Financial ...

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

Cary, North Carolina, 13th March 2025, CyberNewsWire The post INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats appeared first on Security Boulevard.

How to detect Headless Chrome bots instrumented with Puppeteer?

Headless Chrome bots powered by Puppeteer are a popular choice among bot developers. The Puppeteer API’s ease of use, combined with the lightweight nature of Headless Chrome, makes it a preferred tool over its full-browser counterpart. It is ...

ISAC Executive Order Increases Risk for Small Towns

All of the small towns across America will have less time to prepare for and need more time to respond to and recover from threats to and attacks on their election infrastructure. The post ISAC Executive Order Increases Risk for Small Towns ...

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key madhav Thu, 03/13/2025 - 06:46 As large organizations increasingly shift towards passwordless solutions, the benefits are clear: ...

Security Neglect: Like an Unserviced Car, It’s Only a Matter of Time

Security is like car maintenance - you either keep up with it, or you deal with the consequences. And by the time you see the check engine light, it might already be too late.  The post Security Neglect: Like an Unserviced Car, It’s Only a ...

CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety ...

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads ...

Cybersecurity jobs available right now in Europe: March 13, 2025

Cloud Security Engineer TUI Group | Portugal | Hybrid – View job details As a Cloud Security Engineer, you will contribute to the implementation of security solutions and will work alongside our Security Operations team to ensure ...

The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now

The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now The post The Rise of XWorm RAT: What Cybersecurity Teams Need to Know Now appeared first on Security Boulevard.

Ollama Unauthorized Access Vulnerability Due to Improper Configuration (CNVD-2025-04094)

Overview Recently, NSFOCUS detected that Ollama improperly configured and unauthorized access vulnerabilities were disclosed online (CNVD-2025-04094); Because Ollama does not have authentication and access control functions by default, when a ...