Application Security News and Articles


Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity

The water industry provides the drinking water and wastewater systems we all use every day. As such, it counts as a key piece of the nation’s critical infrastructure. But it is also in the crosshairs of a dangerous new wave of cyberattacks, ...

ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference

We had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged at the Venetian Convention Center and Ceasar’s ...

PCI DSS SAQ A-EP: Secure Your E-Commerce Payments

The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Feroot Security. The post PCI DSS SAQ A-EP: Secure Your E-Commerce Payments appeared first on Security Boulevard.

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms. The post Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign appeared first on SecurityWeek.

BSides Exeter 2024 – Blue Track – Suppliers: Trust, But Verify

Author/Presenter: Todd Gifford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering. The post Microsoft Warns of Hospitality Sector Attacks Involving ClickFix appeared first on SecurityWeek.

Untangle AWS IAM Policy Logic and Move Toward Least Privilege

AWS Identity and Access Management (IAM) is powerful, but it is also one of the most complex and frustrating aspects of cloud security. Security teams want to enforce least privilege, but AWS IAM’s additive permissions model, combined with ...

Hackers Use Trump’s Coin, Binance’s Name in Crypto Phishing Scam

Threat actors are running an email phishing scam to entice victims to install Binance software in hopes of collecting TRUMP coins. However, if they try, they instead get the ConnectWise RAT installed on their systems, which could let the malware ...

OWASP supply chain security cheat sheet: 5 key action items

Securing the software supply chain is a complex task. For one, it spans the entire software development lifecycle (SDLC). For another, generative AI coding tools and modern development practices are increasing software complexity. The result: ...

Application Attacks Rise Significantly | February Attack Data | Contrast Security

The number of attacks on individual applications are up significantly month to month, according to research from Contrast Security. The Contrast Labs team found that, on average, applications faced 77 real attacks in February — “real” ...

DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware

Tenable Research examines DeepSeek R1 and its capability to develop malware, such as a keylogger and ransomware. We found it provides a useful starting point, but requires additional prompting and debugging. Background As generative artificial ...

DeepSeek’s Malware-Generation Capabilities Put to Test

Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek.

North Korean Hackers Distributed Android Spyware via Google Play

The North Korea-linked APT37 has been observed targeting Android users with spyware distributed via Google Play. The post North Korean Hackers Distributed Android Spyware via Google Play appeared first on SecurityWeek.

DFARS 101: Protecting CUI in Defense Contracts

If your company handles Controlled Unclassified Information (CUI) for defense contracts, you’ve likely encountered DFARS and its key cybersecurity clauses: 7012, 7019, 7020, and 7021. But what exactly is DFARS, why is compliance crucial, and ...

Medusa Ransomware Made 300 Critical Infrastructure Victims

CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations. The post Medusa Ransomware Made 300 Critical Infrastructure Victims appeared first on SecurityWeek.

Suspected North Korea Group Targets Android Devices with Spyware

A North Korea-backed threat group, APT37, disguised KoSpy as utility apps in Google Play to infect Android devices, using the spyware for such activities as gathering sensitive information, tracking locations, capturing screenshots, recording ...

Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution

Organizations can align their processes with one of two global industry standards for self-assessment and security maturity—BSIMM and OWASP SAMM. The post Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development ...

QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer

QuamCore’s secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat. The post QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer appeared first on SecurityWeek.

NYDFS Cybersecurity Regulation: Dates, Facts and Requirements

New York, the city that never sleeps, is also the city that takes cybersecurity very seriously. If you’re part of the financial services ecosystem here—or interact with businesses regulated by the New York State Department of Financial ...

INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats

Cary, North Carolina, 13th March 2025, CyberNewsWire The post INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats appeared first on Security Boulevard.