Application Security News and Articles


Single Sign-On (SSO) Differentiation Between Human and Autonomous Non-Human Identities

This in-depth research investigates Single Sign-On (SSO) and its application to both human users and non-human identities. Learn about the necessary differentiations for robust security and effective access management in diverse digital ...

When DoD SAFE is Down: Secure File Sharing Options for Defense Contractors

With the recent passage of the CMMC Final Rule, many defense contractors have been reminded of the requirement to ensure the secure exchange of their files containing Controlled Unclassified Information (CUI). One popular solution used by the ...

DEF CON 32 – Top 10 Cybersecurity Trends In Critical Infrastructure For 2024

Author/Presenter: Mars Cheng Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

OT/ICS cyber threats escalate as geopolitical conflicts intensify

Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming ...

Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data

The Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company. The post Gabbard Decries Britain’s Reported Demand for Apple to ...

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

Users of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the ...

API Armor: How Bybit’s Real-Time Blacklisting Is Thwarting a $1.5B Crypto Heist

APIs present a security risk—that much is a given. Attacks on APIs have caused some of the most significant security incidents of the past decades. But the question now is: How can we flip the script and leverage their power to enhance ...

Senator Susan Collins’ Betrayal of Maine Demands Accountability

I sent this as an op-ed to the Portland Press Herald but have no delusion they will ACK it or post even a small part of it. As a longtime Mainer and independent voter, I have watched Senator Susan Collins’ career with cautious optimism, hoping ...

How to Avoid Costly Technical Debt and Get Your Software Project Back on Track

Software projects don’t always go as planned. Deadlines slip, budgets overrun, and technical challenges mount. What starts as a minor issue can quickly snowball into...Read More The post How to Avoid Costly Technical Debt and Get Your Software ...

In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story

Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack. The post In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story ...

OSPS Baseline: Practical security best practices for open source software projects

The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that ...

Ransomware Group Takes Credit for Lee Enterprises Attack

The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions. The post Ransomware Group Takes Credit for Lee Enterprises Attack appeared first on SecurityWeek.

Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes

The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago.  The post Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes appeared first on SecurityWeek.

Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face 

Businesses face increasing pressure to maintain compliance across regions, mitigate risks and improve consumer protection and stakeholder trust.  The post Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face  ...

Microsoft Names Suspects in Lawsuit Against AI Hackers

In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek.

Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats  

  The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and evade detection.  The Veriti Research team analyzed these chat logs, revealing our ...

PowerDMARC Ranks Among G2’s Top 100 Fastest-Growing Software Companies 2025

PowerDMARC secures a spot in G2’s Top 100 Fastest-Growing Software Companies of 2025! Learn how our innovative email authentication solutions drive security, trust, and growth. The post PowerDMARC Ranks Among G2’s Top 100 Fastest-Growing ...

Understanding the AI Act and its compliance challenges

In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity ...

The art of balancing data security with business goals

In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused ...

Infosec products of the month: February 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armor, BigID, Dynatrace, Fortinet, Legit Security, Netwrix, Nymi, Palo Alto Networks, Pangea, Privacera, Qualys, SafeBreach, Satori, Seal ...