Application Security News and Articles


Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391) February 2025 Patch Tuesday is here, and Microsoft has ...

Keeping Your Cloud Data Safe: What You Need to Know

Why is Cloud Data Safety a Paramount Concern? With the increasing movement of organizations to the cloud, ensuring data security has become a top priority. It’s a well-known fact that organizations thrive on data. But what if this data falls ...

A Deadly Unserious 419?

Over a decade ago, I was more than a little amused at a 419 message of the “I’ve been hired to assassinate you” sub-category to which my  friend and colleague Urban Schrott, then at ESET Ireland, drew my attention, so I wrote it up in a ...

DEF CON 32 – Fitness of Physical Red Teamers

Authors/Presenters: Lucas Rooyakkers & Billy Graydon Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

The Hidden Cybersecurity Crisis: How GenAI is Fueling the Growth of Unchecked Non-Human Identities

Proper GenAI governance will control and manage the risks associated with NHI growth, bringing equilibrium and balance between security and AI innovation to IT ecosystems. The post The Hidden Cybersecurity Crisis: How GenAI is Fueling the Growth ...

Law Enforcement Can’t Save You From Romance Scams 

Once a conversation starts and a personal connection is established, scammers behind a screen can lure their targets into video call scams utilizing high-quality deepfake technology The post Law Enforcement Can’t Save You From Romance Scams  ...

DOGE.gov Debacle: How a Government Website Went to the Dogs and What It Means for Cybersecurity

The Department of Government Efficiency (DOGE) website was left vulnerable to unauthorized edits. This breach exposes critical flaws in government digital infrastructure and highlights the importance of robust security measures, even for ...

Achieving Independent Control Over Cloud Data

Why is Independent Control Over Cloud Data Necessary? Can organizations truly claim to have complete, independent control over their cloud data? Surprisingly, the answer is often ‘no’. It’s an undeniable fact that the digital transformation ...

Adaptable Security Measures for Dynamic Clouds

Is Adaptable Security the Future of Cybersecurity in Dynamic Cloud Environments? The need for adaptive and responsive measures in cybersecurity becomes increasingly paramount. Within these shifting terrains, Non-Human Identities (NHIs) are ...

Delinea Extends Scope of Identity Management Platform

Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the lifecycle of an identity from ...

SailPoint IPO Signals Bright Spot for Cybersecurity

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek.

Microsoft GCCH vs. Google Public Sector for CMMC

When it comes to overall productivity platforms, collaboration tools, and office suites, the two biggest options dominating the market are the Google G Suite and Microsoft’s Office ecosystem. Whether it’s word processing, team collaboration, ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated Russian criminal adversary known as FIN7 based on activities observed between 2022 and 2023. The post Emulating the ...

DEF CON 32 – GUR RIBYHGVBA BS PELCGBTENCUL

Author/Presenter: Jeff Man Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Streamlining Security Operations: How the PDI Cybersecurity Platform is Transforming Cybersecurity Management

Security teams face a growing dilemma: how to effectively protect their organizations while juggling limited resources and mounting complexity. They must manage increasingly complex security infrastructures while confronting sophisticated cyber ...

Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle

A Chinese threat actor who targeted an Asian software company used the same toolset for the ransomware attack that was found in multiple cyberespionage incidents, leaving Symantec analysts to believe the hacker was a Chinese spy who used the ...

PDI AI technology: Your AI-Driven Ally in Proactive Cyber Defense

Imagine you’re part of a cybersecurity team that just received an alert about a potential breach. The clock is ticking, and your team is flooded with data and alerts from multiple sources. Sorting through this overwhelming volume of information ...

From Tools to Intelligence: The Evolution of SOCaaS

In the early days of cybersecurity, security teams faced a fragmented reality—juggling multiple tools that operated in isolation. Managed Detection and Response (MDR) solutions watched for threats, while Endpoint Detection and Response (EDR) ...

Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum

Just meet me at the ADP: Sen. Ron Wyden and Rep. Andy Biggs got no love for the United Kingdom The post Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum appeared first on Security Boulevard.

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems

The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems ...