Application Security News and Articles


Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can ...

Oracle Denies Cloud Breach After Hacker Offers to Sell Data 

Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records. The post Oracle Denies Cloud Breach After Hacker Offers to Sell Data  appeared first on SecurityWeek.

Keeping Secrets Out of Logs: Strategies That Work

tl;dr: There's no silver bullet for keeping secrets out of logs, but if we put several "lead bullets" in the right places, we have a good chance of success. The post Keeping Secrets Out of Logs: Strategies That Work appeared first on Security ...

DEF CON 32 – Recon Village – Bypassing WHOIS Rate Limiting & Tracking Fresh Domains

Speaker: Willis Vandevanter Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Russian Firm Offers $4 Million for Telegram Exploits

A Russian exploit acquisition firm says it is willing to pay up to $4 million for full-chain exploits targeting the popular messaging service Telegram. The firm, Operation Zero, is known for selling zero-day exploits exclusively to Russian ...

Code Commits Are Not a Measure of Software Success, Customer Delight Is

Too often, we hear engineering teams proudly claim, “We push code commits every day.” It sounds impressive, continuous work, constant output, relentless progress. But here’s...Read More The post Code Commits Are Not a Measure of Software ...

We raised a $35M Series B. Here’s what’s next for fake data.

Today, we're excited to announce that Tonic.ai has raised $35 million in Series B funding led by global venture capital and private equity firm Insight Partners. A milestone that serves as further proof of the value of mimicking production data ...

Report: Fortune 500 employee-linked account exposure

A backbone of our economy, Fortune 500 companies employ more than 31 million people worldwide. According to data analyzed by the Enzoic research team, over the past three years of 2022, 2023, and 2024, more than three million employee-linked ...

Eclypsium Earns Spot on Coveted 2025 CRN Partner Program Guide

Global Partner Program empowers partners to deliver top-tier supply chain security solutions to enterprise customers Portland, OR – March 24, 2025 – Eclypsium, a leader in infrastructure supply chain security, is proud to announce that it has ...

Webinar Tomorrow: Which Security Testing Approach is Right for You?

Understand whether BAS, Automated Penetration Testing, or the combined approach of Adversarial Exposure Validation (AEV) aligns best with your organization’s unique security needs. The post Webinar Tomorrow: Which Security Testing Approach is ...

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)

A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app’s admin ...

Privacy Roundup: Week 12 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 16 MAR 2025 - 22 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

US Lifts Sanctions Against Crypto Mixer Tornado Cash

The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash. The post US Lifts Sanctions Against Crypto Mixer Tornado Cash appeared first on SecurityWeek.

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US

The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US. The post FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US appeared first on SecurityWeek.

Prevent, Detect, Contain: A Guide Against Black Basta Affiliates’ Attacks 

Guidance to help organizations reduce their attack surface, implement a stronger defense-in-depth security model, as well as more quickly detect and contain an intrusion by this ever-prevalent threat.   The post Prevent, Detect, Contain: A ...

EU Cyber Resilience Act: What You Need to Know

What is the Cyber Resilience Act? The Cyber Resilience Act is a comprehensive regulatory framework introduced by the EU to enhance cybersecurity resilience. Its primary focus is on minimizing vulnerabilities in digital products and ensuring ...

Medusa Ransomware Uses Malicious Driver to Disable Security Tools

The Medusa ransomware relies on a malicious Windows driver to disable the security tools running on the infected systems. The post Medusa Ransomware Uses Malicious Driver to Disable Security Tools appeared first on SecurityWeek.

Evaluating AI for Security Operations

SOCs without AI aren't just behind the curve — they're fundamentally outmatched in the asymmetric battle against sophisticated threat actors. The post Evaluating AI for Security Operations appeared first on Security Boulevard.

NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use

NetSfere Integrates ML-KEM and AES into its text, voice and video messaging platform to meet 2027 NSA Quantum Security mandates. The post NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use appeared first on ...

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, 24th March 2025, CyberNewsWire The post Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience appeared first on Security Boulevard.