Application Security News and Articles


How to Build Wealth with AirSwap $sAST

Steps to Turn Your AirSwap $sAST Staking into a Wealth-Building StrategyContinue reading on Medium »

DEF CON 32 – Recon Village – OSINT at Clemson: Unmasking John Mark Dougan’s Disinformation Empire

Speaker: Steven Sheffield Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

My Glittering Media Career

I was overjoyed to hear from Doctor Xand on Morning Live today, on how I can improve my lifestyle so that I can count on my knees. On the whole, though, I think I’ll carry on counting on my fingers.* But what is this thing about people on TV ...

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

IntroductionCVE-2025-24813 was originally published on March 10 with a medium severity score of 5.5, and Apache Tomcat released an update to fix it. On March 12, the first attack was detected in Poland by Wallarm researchers, even before a ...

HIPAA Security Rule Amendment: Key Public Comments and Next Steps

Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to amend the HIPAA Security Rule, titled ...

How can legacy IAM systems be updated to support NHIs?

Could Your Legacy IAM Be The Achilles Heel of Your Cybersecurity? When security breaches and data leaks proliferate, organizations grapple with the rising challenge of protecting their digital assets. This is particularly true for organizations ...

What role do NHIs play in modern identity and access management?

How Vital is the Role of Non-Human Identities in Identity and Access Management (IAM)? Have you ever wondered how digital machinery and applications gain access to our systems? The answer lies in Non-Human Identities (NHIs), a critical, yet often ...

How do I ensure secure authentication for NHIs in an IAM system?

Is Your IAM System Adequately Protecting Non-Human Identities? Non-Human Identities (NHIs) are one such intricacy that has increasingly made its way into IAM (Identity Access Management) systems. However, the question remains: How do we ensure ...

StateRAMP Fast Track: How to Speed Up Authorization

Governmental cybersecurity is largely focused on federal government agencies. When we talk about FedRAMP, CMMC, DFARS, and other security standards, it’s almost always with an eye toward the governmental agencies and departments that comprise ...

DEF CON 32 – Recon Village – Pushing the Limits of Mass DNS Scanning

Speaker: Jasper Insinger Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

A Pragmatic Approach to Effective Security

Cybersecurity is constantly evolving, and staying ahead of threats requires more than just tools—it demands strategy, leadership, and expertise. The unfortunate reality is that the threat landscape affects all companies regardless of industry ...

Ex-Michigan, Ravens Football Coach Charged with Hacking Athlete Accounts

Matthew Weiss, former football coach for the University of Michigan and the Baltimore Ravens, for almost 10 years accessed the social media and other online accounts of thousands of student athletes and downloaded personal information and ...

Securing Your Supply Chain from Phishing Attacks

In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the need to level up domain security. The post Securing Your Supply Chain from Phishing Attacks appeared first on Security ...

53% of security teams lack continuous and up-to-date visibility

Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock Security. The majority of organizations struggle to track sensitive ...

In Other News: Critical Chrome Bug, Capital One Hacker Resententencing, Story of Expat Flaw

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw.  The post In Other News: Critical Chrome Bug, Capital One Hacker ...

DEF CON 32 – Recon Village – GeoINT Mastery: A Pixel Is Worth A Thousand Words

Speaker: Mishaal Khan Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Ransomware Group Claims Attack on Virginia Attorney General’s Office

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office. The post Ransomware Group Claims Attack on Virginia Attorney General’s Office appeared first on SecurityWeek.

A Peek on Cloud Security: JSSI 2025

At JSSI 2025, French IT security experts discussed the cloud's impact on security. Presentations covered strategy and technical analysis. GitGuardian’s researchers shared insights on detecting secrets in the cloud and responsibly disclosing ...

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Check out key findings and insights from the “Tenable Cloud AI Risk Report 2025.” Plus, get fresh guidance on how to transition to quantum-resistant cryptography. In addition, find out how AI is radically transforming cyber crime. And get the ...

Malicious ads target Semrush users to steal Google account credentials

Cyber crooks are exploiting users’ interest in Semrush, a popular SEO, advertising, and market research SaaS platform, to steal their Google account credentials. The fraudulent campaign Malwarebytes researchers have spotted a campaign ...