Application Security News and Articles


The OWASP NHI Top 10 and AI risk: What you need to know

Identity management has long been a pillar of any sound cybersecurity program, ensuring that only authorized persons and machines have access to specific data and systems. Today, the rapid adoption of artificial intelligence (AI) is making it ...

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today.  According to multiple reports, OpenAI and Microsoft have been investigating whether ...

Randall Munroe’s XKCD ‘Muons’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Muons’ appeared first on Security Boulevard.

SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws

Watch this: Want more “speculative execution” bugs? You’re gonna be in a great mood all day. The post SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws appeared first on Security Boulevard.

Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior

The Government Accountability Office states that customers are usually unaware of the potential privacy risks and biases that arise from use of personal information. The post Our Digital Footprints are Breadcrumbs for Mapping our Personal ...

Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)

CVE-2024-40891, a command injection vulnerability in Zyxel CPE Series telecommunications devices that has yet to be fixed by the manufacturer, is being targeted by attackers, cybersecurity company Greynoise has warned. Successful exploitation ...

New Zyxel Zero-Day Under Attack, No Patch Available

GreyNoise reports active exploitation of a newly discovered zero-day vulnerability in Zyxel CPE devices. There are no patches available. The post New Zyxel Zero-Day Under Attack, No Patch Available appeared first on SecurityWeek.

How to Find Old Accounts for Deletion

Old accounts are often unmaintained and forgotten - which can be problematic when you want to "clean up" some of your digital footprint by deleting them or go back to secure them with stronger passwords/MFA. How do you find these old accounts ...

Codefinger Ransomware: Detection and Mitigation Using MixMode

The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting Server-Side Encryption with Customer-Provided Keys (SSE-C), attackers gain control over the encryption process, rendering ...

Aligning compliance with business goals: A strategic approach

Compliance management has emerged as a cornerstone of sustainable growth and risk mitigation. Companies today face increasing regulatory demands while striving to achieve ambitious business objectives. Strategic compliance management, therefore, ...

Oligo Raises $50M to Tackle Application Detection and Response

Oligo Security has raised $50 million in Series B funding for its application detection and response (ADR) platform. The post Oligo Raises $50M to Tackle Application Detection and Response appeared first on SecurityWeek.

Flare Academy is Here!

We’re excited to share that we now offer Flare Academy, an educational hub with free interactive online training for cybersecurity professionals.  What is Flare Academy? Flare Academy offers online training modules led by subject matter ...

Swimlane Vulnerability Response Management offers risk-based prioritization

Swimlane announced Vulnerability Response Management (VRM) Solution that extends beyond siloed vulnerability management by offering risk-based prioritization, exploit intelligence and recommended remediation workflows. Swimlane AI automation ...

Ongoing report: Babuk2 (Babuk-Bjorka)

Editor’s note: We will continue to provide updates as further information is forthcoming. On January 27th, 2025, GuidePoint’s Research and […] The post Ongoing report: Babuk2 (Babuk-Bjorka) appeared first on Security Boulevard.

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns

Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine ...

DeepSeek’s popularity exploited by malware peddlers, scammers

As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the ...

Why API Security is Essential for the Hospitality Sector: Safeguarding Your Guests and Your Rewards

Trust is the cornerstone of the hospitality industry. Guests rely on you to safeguard their personal data, payment information, and loyalty rewards. However, in today's digital landscape, this trust faces constant risks. APIs, which serve as the ...

Using AI To Help Keep Your Financial Data Safe 

AI poses great opportunities for people and companies to implement robust systems to minimize the success and long-term effects of attacks.  The post Using AI To Help Keep Your Financial Data Safe  appeared first on Security Boulevard.

New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones

New CPU side-channel attacks named SLAP and FLOP can be exploited to remotely steal data from Apple mobile and desktop devices.  The post New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones appeared first on SecurityWeek.

Aquabot Botnet Targeting Vulnerable Mitel Phones

The Mirai-based Aquabot botnet has been targeting a vulnerability in Mitel SIP phones for which a proof-of-concept (PoC) exploit exists. The post Aquabot Botnet Targeting Vulnerable Mitel Phones appeared first on SecurityWeek.