Application Security News and Articles


Creating realistic, secure test data for Databricks

Databricks is a data analytics platform built to handle the scale and complexity of today’s data. Learn how Tonic integrates seamlessly with Databricks to generate synthetic test data based on production data that is both complex enough to be ...

News alert: Doppler announces integration with Datadog to streamline credential security

San Francisco, Calif., Jan. 30, 2025, CyberNewswire — Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security platform.. This collaboration provides ...

Ransomware Scum — Out For Blood: NYBCe is Latest Victim

Bloody hell: New York Blood Center Enterprises crippled by ransomware scrotes unknown. The post Ransomware Scum — Out For Blood: NYBCe is Latest Victim appeared first on Security Boulevard.

In Other News: Browser Syncjacking, Fake AWS Hack, Google Blocked 2M Bad Apps

Noteworthy stories that might have slipped under the radar: stealing browser data via Syncjacking, hackers falsely claim AWS breach, Google prevented 2 million bad apps from reaching Google Play.  The post In Other News: Browser Syncjacking, ...

Zimperium’s Protection Against Tria Stealer’s SMS Data Theft

As part of our ongoing mission to identify emerging threats to mobile security, our zLabs team shares how we can help protect you against Tria Stealer. The post Zimperium’s Protection Against Tria Stealer’s SMS Data Theft appeared first on ...

Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Learn how the F1 score helps you choose the right tool to strengthen your security posture. The post Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score appeared first on Security Boulevard.

DEF CON 32 – Famous and Not So Famous Unsolved Codes

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack

TLDR: SlackPirate has been defunct for a few years due to a breaking change in how the Slack client interacts with the Slack API. It has a new PR by yours truly to let you loot Slack again out of the box, and a BOF exists to get you all the ...

Analyzing DeepSeek’s System Prompt: Jailbreaking Generative AI

DeepSeek, a disruptive new AI model from China, has shaken the market, sparking both excitement and controversy. While it has gained attention for its capabilities, it also raises pressing security concerns. Allegations have surfaced about its ...

Fenix24 Acquires vArmour to Boost Cyber Resiliency Services

Fenix24 this week acquired vArmour to add an ability to detect the relationship between software, as part of an effort to extend the services it provides to enable organizations to recover faster from a cyberattack. The post Fenix24 Acquires ...

How Fraud is Eating Away at Food Delivery Profits

The food delivery industry has a fraud problem. With slim profit margins already under pressure, bad actors are exploiting vulnerabilities on both the consumer and courier sides of delivery platforms. The post How Fraud is Eating Away at Food ...

Italy Blocks Access to the Chinese AI Application DeepSeek to Protect Users’ Data

Italy’s data protection authority expressed dissatisfaction with DeepSeek’s response to its query about what personal data is collected, where it is stored and how users are notified. The post Italy Blocks Access to the Chinese AI Application ...

Searchlight Cyber Acquires Assetnote to Accelerate Remediation

Searchlight Cyber this week revealed it has acquired Assetnote as part of an effort to unify attack surface management with its platform for detecting stolen data that has been published on the Dark Web. The post Searchlight Cyber Acquires ...

SCA & SAST Tool Integration

In this article, we are utilizing two open-source tools to integrate SAST and SCA: SonarQube and OWASP Dependency-TrackContinue reading on Medium »

US, Dutch Authorities Disrupt Pakistani Hacking Shop Network

US and Dutch authorities seized 39 domains to disrupt a network of hacking and fraud marketplaces operated by Saim Raza. The post US, Dutch Authorities Disrupt Pakistani Hacking Shop Network appeared first on SecurityWeek.

Binarly helps organizations prepare for mandatory transition to PQC standards

Binarly announced Binarly Transparency Platform v2.7, a major update that enables corporate defenders to prepare for a mandatory transition to Post-Quantum Cryptography (PQC) standards. As quantum computing advances, the National Institute of ...

2 Arrested in Takedown of Nulled, Cracked Hacking Forums

Two individuals have been arrested and one alleged admin has been charged in the takedown of the Nulled and Cracked cybercrime forums. The post 2 Arrested in Takedown of Nulled, Cracked Hacking Forums appeared first on SecurityWeek.

JumpCloud Acquires Stack Identity to Extend Access Management Reach

JumpCloud this week revealed it has acquired Stack Identity to fuel an effort to add identity security and access visibility capabilities to its directory. The post JumpCloud Acquires Stack Identity to Extend Access Management Reach appeared ...

New York Blood Bank Hit by Ransomware

New York Blood Center Enterprises and its operating divisions have taken systems offline to contain a ransomware attack. The post New York Blood Bank Hit by Ransomware appeared first on SecurityWeek.

Patient monitors with backdoor are sending info to China, CISA warns

Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and ...