Application Security News and Articles


What security considerations should I keep in mind for NHI automation?

Why are Security Considerations Essential for Non-Human Identities Automation? The age of automation has dawned upon us. Automation carries the promise of immense business benefits, yet, it brings forth its own set of security challenges. For ...

5 Ways to Prepare Your Data Estate for Copilot Adoption and Agentic AI

AI Copilots and Agentic AI (those capable of independently taking actions to achieve specified goals) remain the talk of the... The post 5 Ways to Prepare Your Data Estate for Copilot Adoption and Agentic AI appeared first on Symmetry ...

Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware

AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-071A) published on March 12, 2025, which details new behaviors exhibited by Medusa Ransomware. The post Response to CISA Advisory (AA25-071A): #StopRansomware: ...

BSides Exeter 2024 – Blue Track – DFIR – Are We There Yet?

Author/Presenter: James Phillips Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year. The post Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 appeared first on SecurityWeek.

What Is Cybersecurity Risk? A Guide to Protect Your Business

Cybersecurity risk affects every business. A single cyber incident, such as a data breach or ransomware attack, can disrupt operations, expose sensitive data, and create costly compliance issues. The challenge is knowing which risks pose the ...

What Is Secure Coding? Best Practices and Techniques to Apply

Software vulnerabilities pose serious security and business risks. Writing secure code prevents these issues by integrating security into the development process. Instead of fixing vulnerabilities after deployment, developers apply secure coding ...

SafeBreach Coverage for US CERT AA25-071A (Medusa Ransomware)

SafeBreach has added coverage against the Medusa ransomware variant, which has been used to target critical infrastructure organizations, demand ransom payment, and threaten to leak stolen data. The post SafeBreach Coverage for US CERT AA25-071A ...

AD Lite Password Auditor Report: Key Insights and Data

2024 Enzoic AD Lite Password Auditor Report In an era where cyber threats continue to evolve, password security remains one of the most critical yet often overlooked components of an organization’s security posture. Enzoic’s 2024 AD Lite ...

FreeType Zero-Day Being Exploited in the Wild

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.  The post FreeType Zero-Day Being Exploited in the Wild appeared first on SecurityWeek.

Silk Typhoon Targeting IT Supply Chains and Network Devices, Microsoft Reports

Microsoft Threat Intelligence has issued new reporting about tactics being used by Silk Typhoon (also called APT27 or HAFNIUM by some researchers). Silk Typhoon is a Chinese espionage group, observed targeting Microsoft Exchange Servers in 2021, ...

Randall Munroe’s XKCD ‘Water Damage’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Damage’ appeared first on Security Boulevard.

Cisco Patches 10 Vulnerabilities in IOS XR

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs. The post Cisco Patches 10 Vulnerabilities in IOS XR appeared first on SecurityWeek.

How to secure your personal metadata from online trackers

When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, ...

Moving Past Compensating Controls: The Long-Term Value of Tokenization for PCI DSS

With the deadline for PCI DSS 4.0 compliance just around the corner, it’s decision time for organizations. For many, compensating controls are a godsend, introducing a degree of flexibility into what is otherwise a rigorous, demanding and ...

Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity

The water industry provides the drinking water and wastewater systems we all use every day. As such, it counts as a key piece of the nation’s critical infrastructure. But it is also in the crosshairs of a dangerous new wave of cyberattacks, ...

ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference

We had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged at the Venetian Convention Center and Ceasar’s ...

PCI DSS SAQ A-EP: Secure Your E-Commerce Payments

The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Feroot Security. The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Security Boulevard.

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms. The post Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign appeared first on SecurityWeek.

BSides Exeter 2024 – Blue Track – Suppliers: Trust, But Verify

Author/Presenter: Todd Gifford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...