Application Security News and Articles


Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors. The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.

Security’s Next Evolution: From Detection Fatigue to True Remediation 

Security’s Next Evolution: From Detection Fatigue to True Remediation  The security industry has mastered detection. It has even gotten pretty good at prioritization, or so vendors like to claim. But let’s be real: Detection without ...

The Buddy System: Why Google is Finally Killing SMS Authentication

Like the Buddy System in The Simpsons, SMS authentication was only foolproof if everything went right. But when both “buddies” could be compromised at the same time, the entire system was doomed to fail. The post The Buddy System: Why Google ...

Microsoft: Massive Malvertising Campaign Infects a Million Devices

A massive malvertising campaign that targeted individuals watching pirated videos on illegal streaming sites redirected them several times before landing them at GitHub repositories that hosted infostealers and other malware, according to ...

Developer Convicted for Hacking Former Employer’s Systems

Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data. The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.

Google Paid Out $12 Million via Bug Bounty Programs in 2024

In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs. The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek.

Simplifying Compliance and Protecting Data at Garvey School District

How Garvey K-8 School District Partners with ManagedMethods to Keep Data Secure and Students Safe in Google Workspace As a K-8 district, Garvey School District is on a mission. Not only are its 500 staff members responsible for providing a ...

Mass Exploitation of Critical PHP Vulnerability Begins

GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.

SimSpace Stack Optimizer allows organizations to measure their security technologies

SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure. By leveraging SimSpace’s realistic simulated environments, organizations can perform comprehensive security ...

SEC Compliance Requirements: Why Your Risk Appetite Matters

The SEC is getting serious about cybersecurity. Recent regulations and high-profile cases signal a new era of accountability for publicly listed companies. But how do you prepare? How do you protect your business and stay on the right side of the ...

560,000 People Impacted Across Four Healthcare Data Breaches

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.  The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek.

How to Run Axivion Dashboard Server in Docker (Step-by-Step Guide)

In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on DevOps.dev »

How to Run Axivion Dashboard Server in Docker (Step-by-Step Guide)

In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on Medium »

GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure

In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion — a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, experts predict this ...

March 2025 Patch Tuesday forecast: A return to normalcy

The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the January updates addressing 100+ vulnerabilities, we saw 37 CVEs fixed in Windows 11 and 33 CVEs in Windows 10. This ...

Email Strategy & DMARC: How to Stay Ahead of Competitors in 2025

A strong email strategy isn’t just about great content—it’s about ensuring your emails reach inboxes. Learn how DMARC improves deliverability and gives you a competitive edge in 2025. The post Email Strategy & DMARC: How to Stay Ahead ...

Hetty: Open-source HTTP toolkit for security research

Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative to commercial tools like Burp Suite Pro. Built with the needs of penetration testers, security professionals, and bug bounty hunters in mind, Hetty ...

How to safely dispose of old tech without leaving a security risk

Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The data can often still be recovered if devices are erased without proper ...

The Invisible Battlefield Behind LLM Security Crisis

Overview In recent years, with the wide application of open-source LLMs such as DeepSeek and Ollama, global enterprises are accelerating the private deployment of LLMs. This wave not only improves the efficiency of enterprises, but also increases ...

Industry Moves for the week of March 10, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of March 10, 2025. Stay updated with the latest industry trends and shifts.