Application Security News and Articles


기업 방화벽의 60%는 점검에 실패합니다

FireMon Insights가 알려주는 방화벽 정책의 위험과 해결책 방화벽 관리는 네트워크 보안의 숨은 영웅이자 때로는 골칫거리입니다. 방화벽은 네트워크 보안의 최전선 역할을 하지만, 방화벽 ...

BSidesSF 2025: Decentralized Communications: Deep-Dive Into APRS And Meshtastic

Creators, Authors and Presenters: Ankur Tyagi, Mayuresh Dani Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks

Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks. The post In ...

VerifTools Fake ID Operation Dismantled by Law Enforcement

Authorities say VerifTools sold fake driver’s licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts. The post VerifTools Fake ID Operation Dismantled by Law Enforcement appeared first on SecurityWeek.

Tonic.ai product updates: August 2025

Introducing the Data Vending Machine, schema caching in Structural, strengthened synthesis in Textual, + Object and Array generators in Fabricate! The post Tonic.ai product updates: August 2025 appeared first on Security Boulevard.

One unexpected challenge organizations face while implementing SOC 2

One Unexpected SOC 2 Challenge: Overcoming Cultural Resistance to Security-First Thinking When companies start their SOC 2 journey, most expect the technical checklist: configure access controls, deploy logging, and gather evidence. But what ...

Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign

Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration. The post Google Confirms Workspace Accounts Also Hit in ...

TransUnion Data Breach Impacts 4.4 Million

The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations. The post TransUnion Data Breach Impacts 4.4 Million appeared first on SecurityWeek.

Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions

State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems. The post Nevada Confirms Ransomware Attack Behind Statewide Service ...

US Sanctions Russian National, Chinese Firm Aiding North Korean IT Workers

US Treasury sanctions Russian and Chinese entities tied to North Korea’s use of fake IT workers, who exploited stolen identities, AI, and malware to funnel millions back to Pyongyang. The post US Sanctions Russian National, Chinese Firm Aiding ...

Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks

Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware. The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared ...

Microsoft and IRONSCALES Crack Down on the Direct Send Exploit

Back in Part 1, we walked through how attackers are using Microsoft 365’s Direct Send feature to spoof internal emails, making those messages look like they’re coming from a trusted domain. The post Microsoft and IRONSCALES Crack Down on the ...

Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms

A recently uncovered phishing campaign – carefully designed to bypass security defenses and avoid detection by its intended victims – is targeting firms in industrial manufacturing and other companies critical to various supply ...

PortSwigger Lab : Unprotected Admin Functionality with Unpredictable URL

This lab highlights how sensitive paths hidden in source code can lead directly to admin functionality — and without proper access control…Continue reading on System Weakness »

PortSwigger Lab : Unprotected Admin Functionality with Unpredictable URL

This lab highlights how sensitive paths hidden in source code can lead directly to admin functionality — and without proper access control…Continue reading on Medium »

Halo Security platform updates give teams better control over exposure data

Halo Security announced platform enhancements designed to give security teams flexibility and control within the platform. The new features include custom dashboards, configurable reports, and improved automation capabilities that give ...

Generative AI: Boon or Bane? Unveiling Security Risks & Possibilities

Unleash the potential of Generative AI! Explore its groundbreaking applications and discover how to navigate the emerging security risks. This blog dives into t The post Generative AI: Boon or Bane? Unveiling Security Risks & Possibilities ...

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an answer. In a new paper, academics from Inria and the CISPA Helmholtz Center for Information ...

Help Wanted: Dark Web Job Recruitment is Up

Cybercriminal forums are experiencing a recruitment boom, with dark-web job postings for hackers, AI experts, and social engineers doubling year over year. Research from Reliaquest highlights growing demand for English-speaking social ...

Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are ...