Application Security News and Articles


Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094) The suspected Chinese state-sponsored hackers who breached ...

Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants

The post Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants appeared first on Feroot Security. The post Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants appeared ...

North Korea’s Lazarus Group Hacks Bybit, Steals $1.5 Billion in Crypto

North Korea's notorious Lazarus Group reportedly stole $1.5 billion in cryptocurrency from the Bybit exchange in what is being called the largest hack in the controversial market's history. It came the same day Coinbase executives said the SEC ...

DEF CON 32 – Decoding Galah, An LLM Powered Web Honeypot

Authors/Presenters: Adel Karimi Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange

Over 400,000 ETH and stETH worth more than $1.5 billion were stolen from the Bybit cryptocurrency exchange. The post Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange appeared first on SecurityWeek.

ADR Report | Application Detection and Response Trends | Contrast Labs

In a startling finding, Contrast Security Application Detection and Response stopped tens of thousands of attacks that made it past perimeter defenses on a single application in mid-January 2025.  The post ADR Report | Application Detection and ...

Feel Relieved with Effective Secrets Sprawl Control

Are You Aware of the Risks Associated with Secrets Sprawl? You understand the inherent risks associated with secrets sprawl. You have likely dealt with serious repercussions due to lack of visibility and poor secrets lifecycle management, ...

Stay Calm: Securing Your Enterprise Against Leaks

Why Is Protecting Your Enterprise From Data Leaks So Crucial? Where data is the lifeblood of organizations and data breaches are becoming more common, can we truly afford to be complacent about enterprise security? High-profile breaches reveal ...

Achieving Satisfaction in Cloud Security Investments

Is Your Cloud Security Investment Paying Off? The role of cloud security becomes paramount. At the heart of this security conundrum is an often-overlooked element – Non-Human Identities (NHIs). It is fascinating to observe how the management of ...

DEF CON 32 – National Labs Use Of XR

Authors/Presenters: Martin Pratt Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

New Guidelines: Cybersecurity Resilience in the Healthcare Industry

Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human Services tightening the controls and ...

Cases of China-Backed Spy Groups Using Ransomware Come to Light

Cyberattacks detected by Trend Micro and Orange Cyberdefense find hackers using malware linked to China-backed groups and ransomware, adding more evidence that nation-state cyberespionage groups are also now using ransomware and further blurring ...

Security and privacy concerns challenge public sector’s efforts to modernize

For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining key barriers, according to a report by SolarWinds. Only 6% of ...

DEF CON 32 – Incubated ML Exploits: Backdooring ML Pipelines With Input Handling Bugs

Authors/Presenters: Suha Hussain Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Rust rising: Navigating the ecosystem and adoption challenges

Rust continues to gain traction as a powerful programming language, balancing high performance with memory safety. The post Rust rising: Navigating the ecosystem and adoption challenges appeared first on Security Boulevard.

Freelance Software Developers in North Korean Malware Crosshairs

ESET says hundreds of freelance software developers have fallen victim to North Korean hackers posing as recruiters. The post Freelance Software Developers in North Korean Malware Crosshairs appeared first on SecurityWeek.

Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand

Apple says it can no longer offer end-to-end encrypted cloud backups in the UK and insists it will never build a backdoor or master key. The post Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand appeared first on ...

Detecting noise in canvas fingerprinting

In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In this post we'll go deeper on how fraudsters can forge or create fake canvas fingerprints to stay under the radar for ...

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired cryptographic functionality (e.g, ...

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Cisco Talos observed Chinese hackers pivoting from a compromised device operated by one telecom to target a device in another telecom. The post Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics appeared first on SecurityWeek.