Application Security News and Articles


Hackers Attack PowerSchool, Expose K-12 Teacher and Student Data

Giant education software provider PowerSchool reported that hackers using compromised credentials access a database and stole student and teacher data in an attack that the company said was not ransomware, though a ransom apparently was paid. ...

Unlock collaboration and efficiency in software management with SBOMs

As software supply chains grow more complex, organizations face increasing challenges to manage and secure open source components. The post Unlock collaboration and efficiency in software management with SBOMs appeared first on Security Boulevard.

DEF CON 32 – Programming A CTS-V Gauge Cluster Into An ATS-V: Out Of Pure Spite

Author/Presenter: Varjitt Jeeva Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

SonarQube for IDE: Our journey this year, and sneak peek into 2025

Reviewing the enhancements delivered by the SonarQube for IDE team for developers during 2024. Focusing on streamlining the UX for teams, harnessing the power of SonarQube Server and Cloud through connected mode into your IDE, and making it even ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/10/25

Insight No. 1: Lawyer up, CISOs! A recent report found that 70% of CISOs have gotten cold feet about the job, given stories of people in their position who’ve been held personally liable for cybersecurity incidents. To protect themselves, CISOs ...

Job-seeking devs targeted with fake CrowdStrike offer via email

Cryptojackers are impersonating Crowdstrike via email to get developers to unwittingly install the XMRig cryptocurrency miner on their Windows PC, the company has warned. The email Crowdstrike has a web page where job hunters can see which ...

DPDP Rules 2025: What Everything You Need to Know

Every click, swipe, and scroll generates valuable personal data, making privacy an increasingly hot topic. From social media platforms to online shopping sites, almost every business collects, stores, and processes... The post DPDP Rules 2025: ...

Phishing Threats, GenAI Among Top Cybersecurity Risks in 2025

Organizations are facing escalating threats from phishing attacks, personal app usage and the widespread adoption of generative AI (GenAI) in workplaces. According to a Netskope report, phishing attacks surged in 2024, with enterprise employees ...

java security best practices

java security best practicesContinue reading on Medium »

January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance

Welcome to 2025 and a new year of patch excitement! In my December article, I talked about Microsoft’s Secure Future Initiative (SFI) and how it manifested in many of the Microsoft products released in 2024. While this security technology trend ...

From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions 

What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber. The post From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 ...

Alert of Buffer Overflow Vulnerabilities in Multiple Ivanti Products (CVE-2025-0282)

Overview Recently, NSFOCUS detected that Ivanti issued a security announcement and fixed buffer overflow vulnerabilities (CVE-2025-0282) in several products of Ivanti. Due to the stack-based buffer overflow in Ivanti Connect Secure, Ivanti Policy ...

Security Compliance Management Tips for 2025

Security compliance management involves an organization’s proactive measures to protect its assets while adhering to internal security standards and regulatory requirements. This includes developing and implementing procedures and controls ...

Digital Wallets: From Consumer Convenience to Corporate Security

From storing state IDs, driver's licenses and passports to managing payment information, digital wallets have revolutionized the way we handle personal credentials. The post Digital Wallets: From Consumer Convenience to Corporate Security ...

Vulnerability Remediation vs Mitigation: Which Strategy Wins in Cybersecurity?

Cybersecurity vulnerabilities pose significant risks to organizations in today’s digital landscape. Left unaddressed, these vulnerabilities can lead to data breaches, financial losses, and reputational damage. Organizations must decide how to ...

The SBI fake banking app shows that SMS authentication has had its day

As a company fortunate enough to have and maintain our own pentesting team, we often do outreach with other organizations to assist with or provide our expertise in offensive security. In collaboration with the Kerala Police Cyber unit, we were ...

Preventing the next ransomware attack with help from AI

In this Help Net Security interview, Dr. Darren Williams, CEO at BlackFog, talks about how employee training plays a crucial role in preventing ransomware attacks. He points out that human error is often the biggest security risk and explains how ...

New infosec products of the week: January 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BioConnect, BreachLock, McAfee, Netgear, and Swimlane. NETGEAR Armor, powered by Bitdefender, protects home networks against cyber threats Armor is a ...

EVM Trackooor: Tracking Anything and Everything on EVM Chains

Zellic is proud to announce the EVM trackooor, a framework for tracking and processing arbitrary data on blockchains The post EVM Trackooor: Tracking Anything and Everything on EVM Chains appeared first on Security Boulevard.

Top 3 Mistakes PCI DSS SAQ-D Service Providers Are Making in 2025 That Will Knock Them Out of PCI DSS 4 Compliance

The post Top 3 Mistakes PCI DSS SAQ-D Service Providers Are Making in 2025 That Will Knock Them Out of PCI DSS 4 Compliance appeared first on Feroot Security. The post Top 3 Mistakes PCI DSS SAQ-D Service Providers Are Making in 2025 That Will ...