Application Security News and Articles


Exploitation of Old ThinkPHP, OwnCloud Vulnerabilities Surges

Threat actors are increasingly exploiting two old vulnerabilities in ThinkPHP and OwnCloud in their attacks. The post Exploitation of Old ThinkPHP, OwnCloud Vulnerabilities Surges appeared first on SecurityWeek.

PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)

Palo Alto Networks has fixed a high-severity authentication bypass vulnerability (CVE-2025-0108) in the management web interface of its next-gen firewalls, a proof-of-concept exploit (PoC) for which has been made public. “Palo Alto Networks ...

Google Pays Out $55,000 Bug Bounty for Chrome Vulnerability

Google has released a Chrome 133 update to address four high-severity vulnerabilities reported by external researchers. The post Google Pays Out $55,000 Bug Bounty for Chrome Vulnerability appeared first on SecurityWeek.

The SaaS Sprawl of 2025: Tackling the Unseen Security Risks

Tackling the Digital Mess The other day, a technician came over to help me with an unresponsive computer. After bringing it back to life, he started rifling through my installed programs. “What’s this one for?” he asked. “And this one?” ...

Salvador Tech releases Edge-Recovery Platform

Salvador Tech introduced a Edge-Recovery Platform, a leap forward in comprehensive cyber resilience in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape. This new platform will deliver a solution that enables instant ...

Grip SSPM: Next Evolution in SaaS Identity Risk Management

Grip SSPM enhances SaaS security by automating misconfiguration fixes, engaging app owners, and unifying risk management for a smarter, proactive defense. The post Grip SSPM: Next Evolution in SaaS Identity Risk Management appeared first on ...

SaaS Security: Connecting Posture Management & Identity Risk

SaaS security posture management and identity risk are deeply connected. Learn how to unify visibility, automation, and control to protect your SaaS ecosystem. The post SaaS Security: Connecting Posture Management & Identity Risk appeared ...

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance

The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. This revelation deeply concerns me – it is a blatant overreach that ...

Lines Between Nation-State and Cybercrime Groups Disappearing: Google

Threat researchers with Google are saying that the lines between nation-state actors and cybercrime groups are blurring, noting that gangs backed by China, Russia, and others are using financially motivated hackers and their tools while attacks ...

Over 3 million Fortune 500 employee accounts compromised since 2022

More than three million employee-linked corporate accounts were compromised between 2022 and 2024 across Fortune 500 companies, according to Enzoic. This surge is fueled by the widespread use of corporate email addresses for personal accounts and ...

The Rise of Non-Ransomware Attacks on AWS S3 Data

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. ...

CISOs and boards see things differently

Splunk’s latest CISO Report reveals critical insights into cybersecurity priorities, threat trends, and strategies for resilience. In this Help Net Security video, Kirsty Paine, Field CTO & Strategic Advisor at Splunk, discusses the key ...

Making sense of database complexity

IT leaders are grappling with increasingly complex database environments. According to a new survey from Redgate, key concerns include protecting sensitive data, navigating regulatory compliance, and managing the rise of multi-database platforms. ...

Innovations in Machine Identity Management

Are You Ready to Revolutionize Your Approach to Machine Identity Management? We understand the challenges you face in streamlining the complexities of managing Non-Human Identities (NHIs) and their secrets. These machine identities are the unsung ...

Harnessing Powerful Tools for Identity Protection

Can We Truly Secure Our Digital Universe? More businesses are realizing the importance of boosting their cybersecurity measures. One such measure that has gained considerable attention due to its efficiency and effectiveness is Non-Human ...

Integrating Proactive Defense in Cloud Operations

Does Your Cybersecurity Strategy Include Proactive Defense? Threats don’t discriminate – they affect corporations and small businesses alike. So, where does an effective cybersecurity strategy begin? For organizations operating in the cloud, ...

How to Bypass DataDome (And Why It’s Not That Simple)

Hackers and bot operators are often looking for ways to bypass DataDome's protection, but bypassing DataDome isn’t easy. Learn how we ensure DataDome lets in real users while blocking bots and fraud. The post How to Bypass DataDome (And Why ...

What We Learned From Infiltrating 22 Credential Stuffing Crews

Credential stuffing is now a full-scale fraud ecosystem. See what Kasada uncovered from infiltrating 22 groups – and how to stop ATO before it reaches your login page. The post What We Learned From Infiltrating 22 Credential Stuffing Crews ...

DEF CON 32 – ICS 101

Authors/Presenters: Bryson Bort, Tom VanNorman - Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware

The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions. The post Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware appeared first on ...