Application Security News and Articles


A Deep Analysis of the Ransomware Group Babuk2’s Recent Activities

Overview Recently, NSFOCUS CERT detected that the Babuk2 group has been frequently publishing sensitive data of several well-known organizations on its dark web site. The data is from multiple sectors, including government, finance, internet, ...

Vite Arbitrary File Read vulnerability (CVE-2025-30208)

Overview Recently, NSFOCUS CERT detected that Vite issued a security announcement and fixed the arbitrary file reading vulnerability of Vite (CVE-2025-30208). Since the Vite development server does not strictly verify the path when processing URL ...

Cyber Crisis Management Plan: Shield for Brand Reputation

Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...

Android financial threats: What businesses need to know to protect themselves and their customers

The rise of mobile banking has changed how businesses and customers interact. It brought about increased convenience and efficiency, but has also opened new doors for cybercriminals, particularly on the Android platform, which dominates the ...

Cybersecurity spending set to jump 12.2% in 2025

Global cybersecurity spending is expected to grow by 12.2% in 2025, according to the latest forecast from the IDC Worldwide Security Spending Guide. The rise in cyber threats is pushing organizations to invest more in their defenses. AI tools are ...

Healthcare’s alarming cybersecurity reality

89% of healthcare organizations have the top 1% of riskiest Internet of Medical Things (IoMT) devices – which contain known exploitable vulnerabilities (KEVs) linked to active ransomware campaigns as well as an insecure connection to the ...

Post-quantum cryptography and the future of online safety

In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and ...

Infosec products of the month: March 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight Technologies, Outpost24, Palo Alto Networks, Pondurance, Red Canary, ...

Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects

A look into Bitcoin's scripting system and how several projects use Bitcoin's features in their own software The post Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects appeared first on Security Boulevard.

The rise of identity and access management: How IAM evolved to being the new perimeter of cybersecurity

The story of Identity and Access Management (IAM) could be made into a movie with all the drama. The industry and its players have gone from behind-the-scenes underdogs to starring roles. IAM, once just a part of IT, is now arguably the essential ...

The Return of the Baby ASO: Why SOCs Still Suck?

“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our digital tomb. Playbooks, relics of a ...

How do I manage access controls for NHIs to meet compliance requirements?

How Can Non-Human Identities Improve Access Control Compliance? Is it possible that non-human identities (NHIs) could help elevate your organization’s security outlook? when businesses across various sectors like healthcare, finance, and travel ...

What training is necessary for staff regarding NHI compliance?

Why Should Staff Be Trained on Non-Human Identities Compliance? Imagine a business environment where machine identities seamlessly communicate with each other, ensuring the smooth running of essential processes. Wouldn’t it be wonderful if they ...

What metrics should be tracked to ensure NHI compliance?

How Crucial are Non-Human Identities Compliance Metrics? Could you imagine navigating an unknown city without a map? The same goes for managing cybersecurity in our cloud-driven enterprises today. Without clear metrics, we may lose our way amidst ...

CAPTCHA’s Demise: Multi-Modal AI is Breaking Traditional Bot Management

With recent advancements in AI systems capable of easily solving visual, text, and audio challenges, CAPTCHA can’t offer the level of protection it did when conceived. The post CAPTCHA’s Demise: Multi-Modal AI is Breaking Traditional Bot ...

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of this report. ...

How Contrast ADR Speeds up SOC Incident Response Time| SOC Challenges From Alert Fatigue to Application-Layer Visibility | Contrast Security

Just because you work in a security operations center (SOC) doesn’t mean you have to waste your time chasing  dragons. And by “dragons,” we mean the traditional SOC’s difficulty identifying cyberattacks that originate in the black box of ...

Tonic Textual is now on the Databricks Marketplace: unstructured data, meet easy ingestion

Unlock and structure unstructured data with Tonic Textual on the Databricks Marketplace. Streamline AI workflows now. The post Tonic Textual is now on the Databricks Marketplace: unstructured data, meet easy ingestion appeared first on Security ...

BSidesLV24 – IATC – Security Trek: The Next Generation

Author/Presenter: Ira Victor Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

A Smarter Approach to Google Cybersecurity & Student Safety at Compass Charter Schools

ManagedMethods Helps Compass’s IT Team Save Time While Keeping Data Secure and Students Safe Compass Charter Schools are fully online TK-12 public charter schools in California. Compass serves about 2,400 students and employs 215 faculty and ...