Application Security News and Articles


Adam Khan on the Unique Security Challenges in Education IT

Adam Khan, vice president of global security operations for Barracuda Networks, explains what makes securing schools, such as universities, so much more difficult than the average enterprise IT environment.  Unlike traditional enterprises, ...

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391)

3Critical 52Important 0Moderate 0Low Microsoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild. Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, ...

Russian Cybercrime Network Targeted for Sanctions Across US, UK and Australia

Russia-based bulletproof hosting services provider Zservers was sanctioned for providing services to support LockBit ransomware operations. The post Russian Cybercrime Network Targeted for Sanctions Across US, UK and Australia appeared first on ...

Fortune 500 Employees’ Credentials Under Siege

1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times. The post Fortune 500 Employees’ Credentials Under Siege appeared first on Security Boulevard.

High-Severity OpenSSL Vulnerability Found by Apple Allows MitM Attacks

OpenSSL has patched CVE-2024-12797, a high-severity vulnerability found by Apple that can allow man-in-the-middle attacks. The post High-Severity OpenSSL Vulnerability Found by Apple Allows MitM Attacks appeared first on SecurityWeek.

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #325 – Fixing the Bug

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

The Field Engineer’s Handbook: Configuring an Arista Networks Switch with Splunk

Transform your network monitoring capabilities with the powerful combination of Arista Networks' advanced telemetry and Splunk's powerful analytics platform. This comprehensive guide will walk you through establishing a robust integration between ...

Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

General Availability of Improved Analysis Algorithm and Security Posture Management Improvements The BloodHound team previewed several concepts in the last couple of releases that made it easier for customers to visualize attack paths and show ...

Navigating Firewall Security Policy Challenges in Technology Organizations: How FireMon Simplifies Complexity

In the technology sector, innovation and agility are key drivers of success. Organizations in this field lead the charge in adopting cutting-edge architectures like hybrid clouds, microservices, and DevSecOps practices.... The post Navigating ...

Networks hosting botnet C&Cs: Same players, same problems

With every Botnet Threat Update we publish, the same networks consistently appear in the Top 20 for hosting botnet command and control (C&C) servers. But why does this keep happening? In this Botnet Spotlight, we look into the root causes ...

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached ...

SAP Releases 21 Security Patches

SAP has released 19 new and two updated security notes on its February 2025 patch day, including six notes for high-severity vulnerabilities. The post SAP Releases 21 Security Patches appeared first on SecurityWeek.

DEF CON 32 – Eradicating Hepatitis C With BioTerrorism

Authors/Presenters: Mixæl Swan Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

The Rise of Typhoon Cyber Groups

Threats to Critical Infrastructure and the Role of Infrastructure Intelligence While cybersecurity has generally been top-of-mind, and many reports outline both increasing attacks and increasingly complexity of attacks,  among the most ...

Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators

Law enforcement agencies take down the 8Base ransomware group’s infrastructure, arrest four Russian operators. The post Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators appeared first on SecurityWeek.

8Base ransomware group leaders arrested, leak site seized

The Thai police has arrested four individuals suspected of being the leaders of the 8Base ransomware group and of stealing approximately $16 million from 1,000+ victims they targeted with the Phobos ransomware. “Officers from Cyber Crime ...

Industrial Defender 8.0 offers detailed view of OT environments

Industrial Defender announced its latest platform, Industrial Defender 8.0. This release introduces a completely redesigned risk dashboard, helping critical infrastructure and industrial operators manage security and compliance risks by assessing ...

Intel Patched 374 Vulnerabilities in 2024

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects. The post Intel Patched 374 Vulnerabilities in 2024 appeared first on SecurityWeek.

Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers

Dozens of local newspapers owned by media company Lee Enterprises experienced disruptions as a result of a cyberattack.  The post Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers appeared first on SecurityWeek.

Alabama Man Pleads Guilty to Hacking SEC’s X Account

Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek.