Application Security News and Articles


Cybersecurity jobs available right now: January 28, 2025

Application Security Engineer Bumble | United Kingdom | Hybrid – View job details As an Application Security Engineer, you will design and implement security testing tools within CI/CD pipelines to detect vulnerabilities early ...

U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5

The DOJ, which has move aggressively over the past year to find and shut down North Korea's numerous IT worker scams, indicts two U.S. citizens and three others for running a six-year operation the stole more than $866,000 from 10 U.S. companies ...

BTS #44 – Network Appliances: A Growing Concern

In this episode, Paul Asadoorian and Chase Snyder discuss the latest security threats and vulnerabilities affecting network appliances, particularly focusing on Avanti and Fortinet platforms. They explore the increasing risks associated with ...

Is Your Vulnerability Management Strategy Doing More Harm than Good?

Most organizations believe they have a solid process for managing vulnerabilities and exposures. Yet attackers continue to exploit vulnerabilities as one of the most common paths to breaches. This isn’t because these organizations use ...

AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability

Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI ...

DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants

Author/Presenter: Julia Dewitz-Würzelberger Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam

A large-scale phishing campaign is using PDF files and hidden malicious links, as well as posing at the U.S. Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal ...

How to Prepare for EU AI Act Compliance by February 2nd

As the February 2nd deadline approaches, CISOs and CCOs face the pressing task of aligning their organizations with the EU AI Act’s stringent requirements. Chapter 1, Article 4 mandates AI literacy for all staff involved in AI operations, while ...

Why The Rise of AI Agents Demands a New Approach to Fraud Prevention

AI agents like OpenAI Operator complicate fraud detection, demanding fraud prevention solutions that leverage behavioral analysis and client-side signals to properly assess user intent. The post Why The Rise of AI Agents Demands a New Approach to ...

Randall Munroe’s XKCD ‘T. Rex Evolution’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘T. Rex Evolution’ appeared first on Security Boulevard.

News alert: INE Security announces new initiative to help companies accelerate CMMC 2.0 compliance

Cary, NC, Jan. 26, 2025, CyberNewswire — INE Security, a leading global provider of cybersecurity training and certifications, today announced a new initiative designed to accelerate compliance with the Department of Defense’s (DoD) newly ...

TalkTalk Confirms Data Breach, Downplays Impact

UK telecoms firm TalkTalk has confirmed falling victim to a data breach after a threat actor boasted about hacking it. The post TalkTalk Confirms Data Breach, Downplays Impact appeared first on SecurityWeek.

Finding the Right Partner for PCI DSS 4.0.1 Compliance: Requirements 6.4.3 and 11.6.1

by Source Defense Ensuring compliance with PCI DSS 4.0, specifically requirements 6.4.3 and 11.6.1, is not just about meeting regulations—it’s about securing your customers’ trust and protecting your brand from emerging threats like ...

LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity

Vulnerabilities in LTE/5G core infrastructure, some remotely exploitable, could lead to persistent denial-of-service to entire cities. The post LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity appeared first on SecurityWeek.

DEF CON 32 – 3DU Homo ex Machina

Author/Presenter: Lacey Harbour Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Cyber Insights 2025: Cybersecurity Regulatory Mayhem

Cybersecurity regulations are facing a tipping point. There are too many and they are too complex to manage – and it’s getting worse. The post Cyber Insights 2025: Cybersecurity Regulatory Mayhem appeared first on SecurityWeek.

Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST

Opengrep is a new consortium-backed fork of Semgrep, intended to be and remain a true genuine OSS SAST tool. The post Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST appeared first on SecurityWeek.

5,000+ SonicWall firewalls still open to attack (CVE-2024-53704)

5,000+ SonicWall firewalls are still vulnerable to attack via a high-severity vulnerability (CVE-2024-53704) that, according to SonicWall, should be considered “at imminent risk of exploitation”. The warning came last week from Bishop ...

Privacy Roundup: Week 4 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 19 JAN 2025 - 25 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

What is DeepSeek & Why Is It Disrupting the AI Landscape?

The AI world is no stranger to groundbreaking innovations, but DeepSeek, a Chinese AI research lab founded in 2023 by Liang Wenfeng, is making waves...Read More The post What is DeepSeek & Why Is It Disrupting the AI Landscape? appeared first ...