Application Security News and Articles


Anatsa Android Banking Trojan Now Targeting 830 Financial Apps

The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications. The post Anatsa Android Banking Trojan Now Targeting 830 Financial Apps appeared first on SecurityWeek.

3 Benefits to Consider for the ROI of Cyber GRC and How They Impact Your Teams

Organizations invest heavily in cybersecurity tools, yet their executives still can't get a straight answer to the most fundamental question: "What are our biggest risks right now?" The post 3 Benefits to Consider for the ROI of Cyber GRC and How ...

CISA Requests Public Feedback on Updated SBOM Guidance

CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment. The post CISA Requests Public Feedback on Updated SBOM Guidance appeared first on SecurityWeek.

Snyk Security: A Complete Beginner’s Guide to Securing Your Code in Minutes

As developers, we love shipping features fast. But with speed often comes a hidden danger: security vulnerabilities sneaking into our code…Continue reading on Medium »

89 Million Steam Accounts Compromised: Change Your Password Now

89 million Steam accounts breached! Learn how to secure your account and protect your data. Act now to safeguard your gaming identity. The post 89 Million Steam Accounts Compromised: Change Your Password Now appeared first on Security Boulevard.

SASE Company Netskope Files for IPO

Netskope has an annual recurring revenue of more than $707 million, but it’s still not profitable, reporting a net loss of $170 million in H1.  The post SASE Company Netskope Files for IPO appeared first on SecurityWeek.

Code does not lie

Good measurements for cyber security do not have to be technical. From a defence in depth principle it is recommended to have a mix of…Continue reading on Medium »

Arch Linux Project Responding to Week-Long DDoS Attack

The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums. The post Arch Linux Project Responding to Week-Long DDoS Attack appeared first on SecurityWeek.

What are quantum-safe and hybrid certificates?

Quantum computing poses an existential threat to RSA and ECC encryption, making post-quantum cryptography (PQC) essential. This article explains quantum-safe certificates, the new NIST PQC standards, and hybrid certificates that blend classical ...

Tackling cybersecurity today: Your top challenge and strategy

Shadow IT used to be a fringe problem, a rogue Dropbox account here, a personal Gmail there. Now, it’s everywhere. One customer said it best: “We don’t have a Shadow IT problem. We are Shadow IT.” That stuck. It’s not malice. It’s ...

PDPL (UAE)

What is PDPL (UAE)? The Personal Data Protection Law (PDPL), formally known as Federal Decree-Law No. 45 of 2021 on the Protection of Personal Data, is the United Arab Emirates’ first comprehensive data protection framework. Commonly referred ...

PDPL (Saudi)

What is PDPL (Saudi)? The Personal Data Protection Law (PDPL) is Saudi Arabia’s first comprehensive privacy law, designed to protect the personal data of individuals and regulate how organizations handle it. First issued in 2021 and amended in ...

Farmers Insurance Data Breach Impacts Over 1 Million People

Farmers New World Life Insurance and Farmers Group have filed separate data breach notifications with state authorities.  The post Farmers Insurance Data Breach Impacts Over 1 Million People appeared first on SecurityWeek.

Why a new AI tool could change how we test insider threat defenses

Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security teams know the risk well, but they often lack the data needed to train systems that can spot subtle patterns of ...

U.K. Home Office Impersonation: A Protection Playbook for Sponser-Licensed Orgs

UK organizations with sponsor licenses are now targets in a credential-harvesting phishing campaign. This campaign impersonates the UK Home Office and mimics the Sponsor Management System (SMS) login to steal usernames and passwords. Once ...

AI-Powered DDoS: How Attackers Evolve and Defenders Fight Back

DDoS attacks were once crude instruments—digital sledgehammers that would flood a target with massive amounts of traffic until it crashed. While these brute-force assaults remain common, a new generation of attacks is emerging with surgical ...

Why satellite cybersecurity threats matter to everyone

Satellites play a huge role in our daily lives, supporting everything from global communications to navigation, business, and national security. As space becomes more crowded and commercial satellite use grows, these systems are facing new cyber ...

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached storage, or on your own computer. It doesn’t create a full image of ...