Application Security News and Articles


8Base ransomware group leaders arrested, leak site seized

The Thai police has arrested four individuals suspected of being the leaders of the 8Base ransomware group and of stealing approximately $16 million from 1,000+ victims they targeted with the Phobos ransomware. “Officers from Cyber Crime ...

Industrial Defender 8.0 offers detailed view of OT environments

Industrial Defender announced its latest platform, Industrial Defender 8.0. This release introduces a completely redesigned risk dashboard, helping critical infrastructure and industrial operators manage security and compliance risks by assessing ...

Intel Patched 374 Vulnerabilities in 2024

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects. The post Intel Patched 374 Vulnerabilities in 2024 appeared first on SecurityWeek.

Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers

Dozens of local newspapers owned by media company Lee Enterprises experienced disruptions as a result of a cyberattack.  The post Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers appeared first on SecurityWeek.

Alabama Man Pleads Guilty to Hacking SEC’s X Account

Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek.

US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave

Staffers at the nation’s cybersecurity agency whose job is to ensure the security of US elections have been placed on administrative leave. The post US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave appeared ...

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials

A hacker recently offered to sell 20 million OpenAI credentials, but the data likely comes from information stealers, not the AI firm’s systems. The post OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials ...

Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)

Users of iPhones and iPads that run iOS/iPadOS 18 and iPadOS 17 are urged to implement the latest updates to plug a security feature bypass vulnerability (CVE-2025-24200) exploited in the wild in “an extremely sophisticated” attack. ...

Arvest Bank CISO on building a strong cybersecurity culture in banking

In this Help Net Security interview, Mike Calvi, CISO at Arvest Bank, discusses building a strong cybersecurity culture within the banking sector. He explains how leadership, effective reporting, and proactive engagement with associates are key ...

Review: Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition by Jeffrey Caruso explores how nation-states, corporations, and hackers engage in digital warfare. It offers insights into the intersection of cybersecurity, geopolitics, and emerging technology. About the author ...

How to detect and disable Apple AirTags that might be tracking you

Apple’s AirTags are a convenient way to track personal items like keys and bags, but they also raise concerns about unwanted tracking and stalking. To help users stay safe, Apple has implemented several anti-stalking protections, including ...

Cybersecurity jobs available right now: February 11, 2025

Application Offensive Security Consultant Sharp Decisions | USA | On-site – View job details As an Application Offensive Security Consultant, you will perform Offensive Security Testing against applications and APIs. Perform ...

Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks

In-depth model testing reveals a wide range of flaws with high failure rates The post Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks appeared first on Security Boulevard.

The Art of Human-AI Synergy: A Framework for Smart Collaboration

A proven framework for merging human intuition with AI precision to enhance innovation, reduce bias, and scale operations. Explores real-world case studies, ethical considerations, and hybrid workflows that outperform pure automation models. ...

DEF CON 32 – Eradicating Hepatitis C with BioTerrorism

Authors/Presenters: Mixæl Swan Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack 

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.”  The post Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack  ...

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

We’re just getting started down the road to the Internet of Everything (IoE.) Related: IoT growing at a 24% clip To get there – to fully tap the potential of a hyper-interconnected ecosystem where devices, data, AI and humans converge … ...

Chinese DeepSeek AI App: FULL of Security Holes Say Researchers

Xi knows if you’ve been bad or good: iPhone app sends unencrypted data to China—and Android app appears even worse. The post Chinese DeepSeek AI App: FULL of Security Holes Say Researchers appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Suspension Bridge’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Suspension Bridge’ appeared first on Security Boulevard.

Phishing Season 2025: The Latest Predictions Unveiled

Every year, cybercriminals sharpen their tools and refine their tactics to exploit network and security vulnerabilities. Gone are the days of clumsy emails with glaring typos and suspicious attachments. Instead, we face an era of new ...