Application Security News and Articles


Credit Card Fraud: How Does It Work?

A deep dive into some real-live techniques and scripts used by threat actors to commit credit card fraud. See the actual steps involved. The post Credit Card Fraud: How Does It Work? appeared first on Security Boulevard.

The Fallacy of Arbitrary Severity Scales

Let’s assign severity where it belongs, not based on arbitrary scales but on a foundation of proof and context. Only then can we navigate the complexities of modern cybersecurity with confidence and precision. The post The Fallacy of Arbitrary ...

Why Traditional Security Tools Fail to Detect Breaches [+ 4 Examples]

Cybersecurity tools have evolved significantly over the years, yet organizations are still experiencing devastating breaches at an alarming rate. High-profile cyberattacks continue to dominate headlines, raising the question: If companies are ...

Chainguard “FIPS” Apache Cassandra 

Chainguard modified Cassandra so organizations needing FIPS-approved encryption can finally use it—without risky workarounds or costly custom fixes. Apache Cassandr ia a powerful open-source database used by companies worldwide, but it wasn’t ...

Deciphering Black Basta’s Infrastructure from the Chat Leak

By Oleg Lypko, with Estelle Ruellan and Tammy Harper (Flare Research) This article has originally appeared on Cybercrime Diaries On February 20, 2025, the cybersecurity community received an unexpected stroke of luck as internal strife seemingly ...

Persona combats fraud during business onboarding

Persona announced the next generation of their unified KYC-KYB platform that will combat sophisticated fraud during business onboarding and throughout the business lifecycle. These enhancements deliver insights into both businesses and the ...

The cybersecurity ‘fog of war’: How to apply data science to cut through

One of the biggest problems cybersecurity teams face is the overwhelming uncertainty of situations as cyberattacks unfold. It’s hard to know what mitigations to work on first, which systems are most likely to risk business loss as threat ...

Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets

Employees of a third-party company hacked into StubHub's computer system, stole almost 1,000 digital tickets to Taylor Swift concerts and other events, and emailed them to conspirators in New York, who then sold them on StubHub in a scheme that ...

Socure launches Identity Manipulation Risk Score

Socure launched Identity Manipulation Risk Score, a cross-industry predictive risk score designed to stop repeat first-party fraud abusers from exploiting the digital economy at scale. This AI-powered capability is embedded within Sigma ...

Introducing Bots Unmasked: A New Book on Exposing Cyberfraud in the Era of AI

Discover how to outsmart AI-enhanced cyberfraud with Bots Unmasked, the essential book for business, security, and fraud leaders. The post Introducing Bots Unmasked: A New Book on Exposing Cyberfraud in the Era of AI appeared first on Security ...

SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk

Palo Alto, Singapore, 6th March 2025, CyberNewsWire The post SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk appeared first on Security Boulevard.

Federal Contractor Cybersecurity Bill Passes House

The House of Representatives has passed a bill aimed at requiring federal contractors to have a Vulnerability Disclosure Policy (VDP). The post Federal Contractor Cybersecurity Bill Passes House appeared first on SecurityWeek.

Nigerian Accused of Hacking Tax Preparation Firms Extradited to US

Matthew Akande was extradited to the US to face charges for his role in hacking into Massachusetts tax preparation firms’ networks. The post Nigerian Accused of Hacking Tax Preparation Firms Extradited to US appeared first on SecurityWeek.

OpenText Adds AI Threat Detection Module to Platform

OpenText added a threat detection module to its core platform that makes use of artificial intelligence to more accurately surface anomalies. The post OpenText Adds AI Threat Detection Module to Platform appeared first on Security Boulevard.

Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation

A group of financial organizations is asking CISA to rescind and reissue its proposed implementation of CIRCIA. The post Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation appeared first on SecurityWeek.

The Hidden Risks of Digital Currency: Navigating Cybersecurity in the Age of Web3

As the digital era ushers in the proliferation of Web3 technologies, the security of digital assets becomes a paramount concern not just for investors but for anyone venturing into the realm of digital currencies. The shift from government-backed ...

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

S04 EP 03: Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment. The post Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. ...

BadBox Botnet Powered by 1 Million Android Devices Disrupted

A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted. The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek.

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.  The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Scans show that tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days. The post Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks appeared first ...