Application Security News and Articles


Randall Munroe’s XKCD ‘Rotary Tool’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Rotary Tool’ appeared first on Security Boulevard.

Efficient Cybersecurity Compliance: The Smart Approach to Mitigating Risks

Efficiency is the driving force for 2025, with organizations prioritizing smarter operations while maintaining strict regulatory cybersecurity compliance. Manual compliance processes are costly, inefficient, and expose businesses to unnecessary ...

ThreatMate Raises $3.2 Million for Attack Surface Management Platform

ThreatMate has raised $3.2 million in seed funding for its AI-powered attack surface management solution for MSPs. The post ThreatMate Raises $3.2 Million for Attack Surface Management Platform appeared first on SecurityWeek.

10 Common Mistakes in Managing Your Splunk Environment (and how to avoid them)

Splunk is essential for data management and security, but optimizing its implementation and maintenance can be challenging. Avoid these ten common mistakes that can weaken your Splunk environment with practical tips for success. The post 10 ...

Yahoo Finance: U.S. Lawmakers Push to Ban China’s DeepSeek AI Over Security Risks – Feroot Security Analysis

Washington, D.C. – U.S. lawmakers announced a bill to ban DeepSeek, the Chinese AI chatbot app, from government devices following a security analysis by Feroot Security that revealed alarming privacy and national security risks. The research ...

The Explosion of Hardware-Hacking Devices

Due to the growing popularity of the ESP32 IoT platform adoption by security professionals, this article raises several security concerns addressing firmware attacks that could target this user population and what you can do to protect yourself. ...

DEF CON 32 – Custom, Cheap, Easy, And Safe Badges Without Starting From Scratch

Author/Presenter: securelyfitz Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

FINALLY! FCC Gets Tough on Robocall Fraud

KYC isn’t a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling “illegal robocall scheme.” The post FINALLY! FCC Gets Tough on Robocall Fraud appeared first on Security Boulevard.

Ransomware as a Service: How Microsegmentation Can Protect Against This Growing Threat

The Evolution of Ransomware: From Isolated Attacks to a Billion-Dollar Enterprise In the past, ransomware attacks were opportunistic and relatively unsophisticated. A lone hacker would develop a malicious program, spread it via infected email ...

Securing Autonomous AI Workflows Through Advanced Single Sign-On

Single Sign-On (SSO) is transforming how AI agents authenticate across systems. This article explores SSO’s role in enhancing security, enforcing least-privilege access, and enabling real-time threat detection for autonomous AI workflows. The ...

Cybersecurity Insights with Contrast CISO David Lindner | 02/07/25

Insight No. 1: Never fear: Security can handle the workload According to a recent survey from Adaptavist, two out of five (39%) IT and security leaders warn that “excessive workloads” could lead to major security incidents for their ...

In Other News: Cybersecurity Salaries, NanoLock Collapse, NSO Transparency Report

Noteworthy stories that might have slipped under the radar: NanoLock Security ceases operations, NSO publishes transparency report, cybersecurity salaries data.   The post In Other News: Cybersecurity Salaries, NanoLock Collapse, NSO ...

Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System

Hospital Sisters Health System says the personal information of 883,000 individuals was compromised in a 2023 crippling cyberattack. The post Information of 883,000 Stolen in Crippling Attack on Hospital Sisters Health System appeared first on ...

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys

A ViewState code injection attack spotted by Microsoft threat researchers in December 2024 could be easily replicated by other attackers, the company warned. “In the course of investigating, remediating, and building protections against ...

UK Engineering Giant IMI Hit by Cyberattack

UK engineering firm IMI says it suffered a cyberattack that resulted in unauthorized access to some of its systems. The post UK Engineering Giant IMI Hit by Cyberattack appeared first on SecurityWeek.

430,000 Impacted by Data Breaches at New York, Pennsylvania Healthcare Organizations

University Diagnostic Medical Imaging and Allegheny Health Network have disclosed data breaches impacting approximately 430,000 patients. The post 430,000 Impacted by Data Breaches at New York, Pennsylvania Healthcare Organizations appeared first ...

Ransomware Payments Dropped to $813 Million in 2024

An analysis by Chainalysis shows that ransomware payments dropped to $813 million in 2024, from $1.25 billion in 2023.  The post Ransomware Payments Dropped to $813 Million in 2024 appeared first on SecurityWeek.

Trimble Cityworks Customers Warned of Zero-Day Exploitation

Trimble Cityworks is affected by a zero-day vulnerability that has been exploited in attacks involving the delivery of malware. The post Trimble Cityworks Customers Warned of Zero-Day Exploitation appeared first on SecurityWeek.

Java, Taint, and SAST: What is it and why do we need it?

An enormous amount of server-side code is written in Java. So, web applications written in this language must be resistant to certain…Continue reading on Medium »

Securing Data Catalog Implementation

If you have been reached out by your data engineering team to give security approval for a particular data catalog vendor and wondering what a data catalog solution can do, its purpose and how to securely integrate a data catalog solution into ...