Application Security News and Articles


Why Cause Chaos? The Benefits of Having a “Chaos Day”

“The best-laid plans of mice and men often go awry.” - Robert Burns, Scottish poet The post Why Cause Chaos? The Benefits of Having a “Chaos Day” appeared first on Security Boulevard.

Modern Security Testing  – Leveling up the Crash Test Dummy

One thing not often thought of is the lowly crash test dummy. Traditionally, crash test dummies were modeled after male bodies leading to vehicle safety standards and designs being disproportionately geared towards protecting male passengers. As ...

Guide to Network Device Configuration Review

Network infrastructure serves as the backbone of every organization’s IT ecosystem. Ensuring the security, efficiency, and reliability of network devices such as routers, switches, and firewalls is essential to maintaining... The post Guide to ...

Seceon Shines at Channel Partners Conference & Expo and MSP Summit 2025

The Channel Partners Conference & Expo, co-located with the MSP Summit, took place from March 24-27, 2025, at The Venetian Resort & Expo in Las Vegas. Recognized as the world’s largest channel event, it brought together over 7,800 ...

BSidesLV24 – IATC – Wars And Rumors of Wars – What Are The Implications For Domestic Critical Infrastructure?

Authors/Presenters: Karl Holmqvist, Beau Woods Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...

aiSIEM-Cguard: Revolutionizing Cybersecurity with AI-Powered Threat Detection

In today’s evolving digital landscape, cyber threats are becoming increasingly sophisticated, targeting organizations of all sizes. Traditional security measures struggle to keep up with the sheer volume and complexity of modern cyberattacks. ...

How SBOMs drive a smarter SCA strategy

Modern software is largely assembled from open source components, constituting up to 90% of today's codebases. Managing the security and compliance risks associated with this external code is no longer optional — it's a core part of software ...

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware

Analysis found that 99% of healthcare organizations are vulnerable to publicly available exploits. The post Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware appeared first on SecurityWeek.

9-Year-Old NPM Crypto Package Hijacked for Information Theft

Nearly a dozen crypto packages on NPM, including one published 9 years ago, have been hijacked to deliver infostealers. The post 9-Year-Old NPM Crypto Package Hijacked for Information Theft appeared first on SecurityWeek.

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

Palo Alto, USA, 28th March 2025, CyberNewsWire The post SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk appeared first on Security Boulevard.

In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked

Noteworthy stories that might have slipped under the radar: Key members of Hellcat ransomware group identified, controversy around CrushFTP flaw CVE, NYU website hacked and defaced. The post In Other News: Hellcat Hackers Unmasked, CrushFTP Bug ...

JFK and the Houthis: Haste Makes Waste of Security 

Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the decades-long investigation, many of ...

Cloudflare open sources OPKSSH to bring Single Sign-On to SSH

OPKSSH (OpenPubkey SSH) makes it easy to authenticate to servers over SSH using OpenID Connect (OIDC), allowing developers to ditch manually configured SSH keys in favor of identity provider-based access. By tightly integrating with identity ...

New Issuance Requirements Improve HTTPS Certificate Validation

HTTPS certificate issuance now requires Multi-Perspective Issuance Corroboration and linting to improve validation. The post New Issuance Requirements Improve HTTPS Certificate Validation appeared first on SecurityWeek.

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with ...

Best Practices for Cyber Risk Management: Why CISOs Must Lead with Real-time Data

The Shift from Compliance-Driven GRC to Dynamic Cyber Risk Management The world of cybersecurity has undergone a dramatic transformation, moving beyond simple checklists and technical jargon. The focus has shifted from siloed governance, risk, ...

Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)

Google’s fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw – and they found it. There’s ...

Morphing Meerkat Phishing Kits Target Over 100 Brands

A threat actor tracked as Morphing Meerkat abuses DNS mail exchange (MX) records to deliver spoofed login pages. The post Morphing Meerkat Phishing Kits Target Over 100 Brands appeared first on SecurityWeek.

Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe

The Grandoreiro banking trojan has reemerged in new campaigns targeting users in Latin America and Europe. The post Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe appeared first on SecurityWeek.

Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia

Firefox developers have determined that their browser is affected by a vulnerability similar to the recent Chrome sandbox escape zero-day. The post Firefox Affected by Flaw Similar to Chrome Zero-Day Exploited in Russia appeared first on ...