Application Security News and Articles


Impact of Unpatched Vulnerabilities in 2025

Vulnerability-based attacks are growing. Undoubtedly, these attacks are hackers’ favorite ways to gain initial access. Such attacks rose by 124% in the third quarter of 2024 compared to 2023. Furthermore, the quick shot of hackers taking ...

2025 is going to be a bumpy year for IoT

In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising ...

AI-driven scams are about to get a lot more convincing

McAfee’s predictions for 2025 highlight emerging threats that consumers may encounter as cybercriminals exploit advanced AI technology. From hyper-realistic deepfakes and live video scams to AI-driven phishing, smishing, and malware ...

How CISOs can make smarter risk decisions

In this Help Net Security interview, Gavin Reid, CISO at HUMAN Security, talks about the latest cybersecurity threats and how attackers are becoming more sophisticated. He explains the difficulties organizations encounter in detecting fraud and ...

Cybersecurity jobs available right now: December 24, 2024

Application Security DevOps engineer Twixor | India | On-site – View job details As an Application Security DevOps engineer, you will Implement and oversee application security measures to protect company’s software and ...

API security blind spots put businesses at risk

Many customer-facing APIs remain unprotected, leaving businesses vulnerable to breaches. To address these threats, a comprehensive approach to API security, covering every stage of the lifecycle, is essential to protect sensitive data and prevent ...

How SLED Organizations Can Enhance Cybersecurity Compliance Before Year-End

As the year comes to a close, State, Local, and Education (SLED) organizations must resharpen their focus on strengthening their cybersecurity defenses. With the growing complexity of cyber threats and the need to safeguard valuable data, it’s ...

Achieving Stability with Enhanced Secret Detection

Is the Quest for Stability an Uphill Battle in Cybersecurity? In the vast landscape of data management and cybersecurity, professionals constantly grapple with threats that lurk in the shadows, invisible and unpredictable. The elusive nature of ...

DEF CON 32 – Disenshittify Or Die! How Hackers Can Seize The Means Of Computation

Authors/Presenters: Cory Doctorow Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Hidden Cost of Web Pixels – A Privacy and Security Nightmare

Hey everyone, let’s talk about something we all encounter every day on the internet: web pixels. You might know them as tracking pixels or pixel tags. These tiny snippets of code, often invisible to the naked eye, are embedded in websites and ...

Life in the Swimlane with Nick Jones, Service Design Architect

The post Life in the Swimlane with Nick Jones, Service Design Architect appeared first on AI-Enhanced Security Automation. The post Life in the Swimlane with Nick Jones, Service Design Architect appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Exclusion Principle’

Permalink The post Randall Munroe’s XKCD ‘Exclusion Principle’ appeared first on Security Boulevard.

DEF CON 32 – Hacker Jeopardy – Night 2

Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. ...

The Top 5 Kubernetes CVEs of 2024: Have You Patched Them Yet?

Keeping up to date with critical vulnerabilities related to Kubernetes can be challenging for a variety of reasons. The biggest one may be related to Kubernetes itself; it’s a complex and rapidly evolving platform, with regular updates and new ...

The Future of Growth: Getting Back to Basics in an AI-Powered World

As AI revolutionizes sales and marketing, successful businesses are returning to fundamental growth principles. Explore how to balance automation with authentic human connection in this comprehensive guide to future-proof your growth ...

US charges suspected LockBit ransomware developer

The US Department of Justice has unsealed charges against Rostislav Panev, 51, a dual Russian and Israeli national, suspected of being a developer for the LockBit ransomware group. Panev was arrested in August 2024 and is currently in custody in ...

Peter Shor Broke PKI with Ancient Math, and Futuristic Quantum Computing

Peter Shor revolutionized public-key infrastructure (PKI) using concepts that trace back to 4,000-year-old Babylonian mathematics and culminated in futuristic quantum computing. Here, we explore the math with a simple, illustrative tool to break ...

Health Care Data of Almost 1 Million ConnectOnCall User Exposed

A hack of health care services provider ConnectOnCall exposed the sensitive data of more than 914,000 users, the latest proof point of the growing interest threat actors have in targeting hospitals and other health care organizations. The post ...

Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People

National Public Data, a background check company that collects sensitive personal information, is facing a class-action legal complaint for allowing the data from 2.9 billion people to be stolen in a breach and later sold on the dark web for ...

Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims

Chinese crooks are running a global network of more than 75,000 fake online shops to steal credit card data and process fraudulent payments. The post Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims appeared first on Security ...