Application Security News and Articles


New infosec products of the week: March 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows organizations to measure their security technologies Stack Optimizer is ...

One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild

A devastating new remote code execution (RCE) vulnerability, CVE-2025-24813, is now actively exploited in the wild. Attackers need just one PUT API request to take over vulnerable Apache Tomcat servers. The exploit, originally published by a ...

Boards Challenged to Embrace Cybersecurity Oversight

Integrating Cyber Risk into Business Risk Decisions Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially ...

What role do APIs play in automating NHI management?

Could API Automation Be The Missing Piece In Your NHI Management? One critical question stands out: Could the underutilized potential of API automation be the missing piece in your Non-Human Identities (NHI) management strategy? With the ...

How can I integrate automated NHI auditing into our pipeline?

How Can Automated NHI Auditing Enhance Your Cybersecurity Strategy? Is your organization struggling with managing the ever-increasing volume of Non-Human Identities (NHIs) within your IT infrastructure? The NHI universe comprises machine ...

What security considerations should I keep in mind for NHI automation?

Why are Security Considerations Essential for Non-Human Identities Automation? The age of automation has dawned upon us. Automation carries the promise of immense business benefits, yet, it brings forth its own set of security challenges. For ...

5 Ways to Prepare Your Data Estate for Copilot Adoption and Agentic AI

AI Copilots and Agentic AI (those capable of independently taking actions to achieve specified goals) remain the talk of the... The post 5 Ways to Prepare Your Data Estate for Copilot Adoption and Agentic AI appeared first on Symmetry ...

Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware

AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-071A) published on March 12, 2025, which details new behaviors exhibited by Medusa Ransomware. The post Response to CISA Advisory (AA25-071A): #StopRansomware: ...

BSides Exeter 2024 – Blue Track – DFIR – Are We There Yet?

Author/Presenter: James Phillips Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year. The post Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 appeared first on SecurityWeek.

What Is Cybersecurity Risk? A Guide to Protect Your Business

Cybersecurity risk affects every business. A single cyber incident, such as a data breach or ransomware attack, can disrupt operations, expose sensitive data, and create costly compliance issues. The challenge is knowing which risks pose the ...

What Is Secure Coding? Best Practices and Techniques to Apply

Software vulnerabilities pose serious security and business risks. Writing secure code prevents these issues by integrating security into the development process. Instead of fixing vulnerabilities after deployment, developers apply secure coding ...

SafeBreach Coverage for US CERT AA25-071A (Medusa Ransomware)

SafeBreach has added coverage against the Medusa ransomware variant, which has been used to target critical infrastructure organizations, demand ransom payment, and threaten to leak stolen data. The post SafeBreach Coverage for US CERT AA25-071A ...

AD Lite Password Auditor Report: Key Insights and Data

2024 Enzoic AD Lite Password Auditor Report In an era where cyber threats continue to evolve, password security remains one of the most critical yet often overlooked components of an organization’s security posture. Enzoic’s 2024 AD Lite ...

FreeType Zero-Day Being Exploited in the Wild

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.  The post FreeType Zero-Day Being Exploited in the Wild appeared first on SecurityWeek.

Silk Typhoon Targeting IT Supply Chains and Network Devices, Microsoft Reports

Microsoft Threat Intelligence has issued new reporting about tactics being used by Silk Typhoon (also called APT27 or HAFNIUM by some researchers). Silk Typhoon is a Chinese espionage group, observed targeting Microsoft Exchange Servers in 2021, ...

Randall Munroe’s XKCD ‘Water Damage’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Damage’ appeared first on Security Boulevard.

Cisco Patches 10 Vulnerabilities in IOS XR

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs. The post Cisco Patches 10 Vulnerabilities in IOS XR appeared first on SecurityWeek.

How to secure your personal metadata from online trackers

When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are essential, they overlook one important element—metadata. This data, ...

Moving Past Compensating Controls: The Long-Term Value of Tokenization for PCI DSS

With the deadline for PCI DSS 4.0 compliance just around the corner, it’s decision time for organizations. For many, compensating controls are a godsend, introducing a degree of flexibility into what is otherwise a rigorous, demanding and ...