Application Security News and Articles


Defending against EDR bypass attacks

EDR bypass and killer attacks are surging, yet many organizations continue to overlook this threat while they have become over-reliant on this security tool – particularly when preventing ransomware. In this Help Net Security video, John ...

Microsoft Copilot Spoofing: A New Phishing Vector

Microsoft Copilot Spoofing: A New Phishing Vector The post Microsoft Copilot Spoofing: A New Phishing Vector appeared first on Security Boulevard.

Code Injection Attacks

Injection vulnerabilities remain among the most critical and Injection vulnerabilities remain among the most critical and commonly exploited security risks in modern applications. The post Code Injection Attacks appeared first on Cycode. The post ...

Are Threat Groups Belsen and ZeroSevenGroup Related?

Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related? appeared first on SecurityWeek.

Unlock the Power of ServiceNow CMDB with Grip Security

Enhance ServiceNow CMDB with Grip Security’s automated SaaS integration. Eliminate blind spots, reduce risk, and keep your CMDB continuously updated. The post Unlock the Power of ServiceNow CMDB with Grip Security appeared first on Security ...

How the EU Product Liability Directive (EU PLD) is Changing Software Security | Contrast Security

Companies that sell software that can be used or downloaded by anyone in the European Union are facing a major new liability. Late last year, the European Commission finalized fundamental changes to the EU Product Liability Directive (PLD) — ...

News alert: GitGuardian discloses 70% of leaked secrets remain active 2 years — remediation urgent

Boston, Mass., Mar. 11, 2025, CyberNewswire — GitGuardian, the security leader behind GitHub’s most installed application, today released its comprehensive “2025 State of Secrets Sprawl Report,” revealing a widespread and persistent ...

Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw

Apple warns that the WebKIt bug "may have been exploited in an extremely sophisticated attack against specific targeted individuals.” The post Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw appeared first on SecurityWeek.

BSides Exeter 2024 – Purple Track – Exercise Army Cyber Spartan

Author/Presenter: Ben Helliwell Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

Lessons from the Field, Part III: Why Backups Alone Won’t Save You

James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at the end of this month, the timing felt right. ...

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 

Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild. The post Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  appeared first on SecurityWeek.

Microsoft’s March 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-26633, CVE-2025-24983, CVE-2025-24993)

6Critical 50Important 0Moderate 0Low Microsoft addresses 56 CVEs, including seven zero-day flaws, with six of those being exploited in the wild. Microsoft patched 56 CVEs in its March 2025 Patch Tuesday release, with six rated critical, and 50 ...

Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader

Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications. The post Patch Tuesday: Critical Code-Execution Bugs in Acrobat and Reader appeared first on SecurityWeek.

Silk Typhoon Hackers Indicted

Lots of interesting details in the story: The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the world, including eight staffers for the ...

UK Government Report Calls for Stronger Open Source Supply Chain Security Practices

Report from the Department for Science, Innovation & Technology (DSIT) finds weaknesses in current practices. The post UK Government Report Calls for Stronger Open Source Supply Chain Security Practices appeared first on SecurityWeek.

New Ballista IoT Botnet Linked to Italian Threat Actor

Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers.   The post New Ballista IoT Botnet Linked to Italian Threat Actor appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Tall Structures’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Tall Structures’ appeared first on Security Boulevard.

Why Static Application Security Testing (SAST) is Important and What You Can Do

Do you remember the time your software application faced a security breach? It’s an unsettling experience that can cost a fortune, risk…Continue reading on Medium »

AlgoSec and ColorTokens: Integrated to Stop Cyberattacks in Every Direction

There are two vectors that hackers use to attack your enterprise. One is characterized as the North-South vector, which describes traffic moving between the enterprise and the public internet (or other outside networks, such as partners or ...

How to spot and avoid AI-generated scams

As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing phishing emails that are difficult to spot. Phishing, deepfakes, and voice cloning are ...