Application Security News and Articles


The 5 stages of incident response grief

Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in the wake ...

DEF CON 32 – War Stories – Breaking Network Crypto In Popular Chinese Keyboard Apps

Author/Presenter: Jeffrey Knockel, Mona Wang Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Cybereason CEO Resigns Amid Funding Dispute with Investors

Eric Gan, who last month filed a lawsuit against top Cybereason investors for rejecting multiple financing plans, reportedly resigned as the company's CEO after months of turmoil within the cybersecurity company's boardroom. The post Cybereason ...

Eleven11bot Captures 86,000 IoT Devices for DDoS Attacks

The massive Eleven11bot has compromised more than 86,000 IoT devices, including security cameras and network video recorders, to launch hundreds of DDoS attacks, and security researchers say the threat actors behind the botnet are trying to grow ...

Iranian Hackers Target UAE Firms With Polyglot Files

An Iranian threat actor was seen targeting UAE organizations with polyglot files to deliver a new backdoor named Sosano. The post Iranian Hackers Target UAE Firms With Polyglot Files appeared first on SecurityWeek.

We’re losing — but it can’t get any worse, right?

We’re losing — but it can’t get any worse, right? LLMs are being used in many ways by attackers; how blind are you? We’re spending hundreds of billions and losing trillions in cybersecurity. The industry structure is partially to ...

North Korean Fake IT Workers Pose as Blockchain Developers on GitHub

North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms. The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek.

If Businesses Can’t Afford a Chief AI Officer? Here’s the Alternative Way

AI is a Necessity, But a Chief AI Officer Might Not Be Feasible Artificial Intelligence (AI) is transforming industries, optimizing operations, and redefining how businesses...Read More The post If Businesses Can’t Afford a Chief AI Officer? ...

Two Venezuelans Arrested in US for ATM Jackpotting

Several Venezuelans have been arrested and charged in the US in recent months for their role in ATM jackpotting schemes. The post Two Venezuelans Arrested in US for ATM Jackpotting appeared first on SecurityWeek.

Ransomware Group Claims Attack on Tata Technologies

Notorious ransomware group Hunters International threatens to leak 1.4 TB of data allegedly stolen from Tata Technologies. The post Ransomware Group Claims Attack on Tata Technologies appeared first on SecurityWeek.

Chrome 134, Firefox 136 Patch High-Severity Vulnerabilities

Chrome 134 and Firefox 136 are rolling out across desktop and mobile with patches for multiple high-severity vulnerabilities. The post Chrome 134, Firefox 136 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing 

Knostic provides a “need-to-know” filter on the answers generated by enterprise large language models (LLM) tools. The post Knostic Secures $11 Million to Rein in Enterprise AI Data Leakage, Oversharing  appeared first on SecurityWeek.

Escape + Wiz: Unified Security for Modern, Cloud-Native Applications

A new technology partnership enables mutual customers to gain full cloud and application context, establish clear ownership, and accelerate the remediation of critical risks. The post Escape + Wiz: Unified Security for Modern, Cloud-Native ...

US Sanctions Iranian Administrator of Nemesis Darknet Marketplace

Iranian national Behrouz Parsarad sanctioned for running Nemesis, a marketplace used for narcotics trafficking and cybercrime.  The post US Sanctions Iranian Administrator of Nemesis Darknet Marketplace appeared first on SecurityWeek.

Sonatype AI SCA delivers visibility and control over AI/ML usage

Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI. With its expertise in open source governance, Sonatype now extends its trusted platform to protect, ...

Why Supply Chain Attacks Are The Biggest Threat To Businesses?

In 2024, approximately 183,000 customers worldwide were affected by supply chain attacks. In terms of frequency, the software supply chain experienced one attack every 48 hours. Surprisingly, India is among the most targeted countries, along with ...

Top 7 Cyber Security Challenges Faced by SaaS Organizations

Today’s technology-driven world needs Software-as-a-Service (SaaS) organizations. Their software solutions help organizations perform effectively and efficiently. SaaS applications are easily available over the internet. It allows users to ...

What is Red Teaming?

Red teaming is like staging a realistic rehearsal for a potential cyber attack to check an organization’s security resilience before they become actual problems. The exercise has three key phases: getting inside the system, maintaining their ...

What is the Process of ISO 27001 Certification?

In 2025, the cost of cyberattacks will reach $10.5 trillion globally. The projected growth rate is 15% every year. While the cost of attack keeps increasing, a breach is now identified in 194 days on average. It takes 64 days to contain a breach ...

Integrating Payroll Systems: Risks, Challenges, and Solutions

Discussing the challenges, risks and solutions for businesses integrating payroll software and systems for seamless efficiency. The post Integrating Payroll Systems: Risks, Challenges, and Solutions appeared first on Security Boulevard.