Application Security News and Articles
Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.
The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.
Security’s Next Evolution: From Detection Fatigue to True Remediation The security industry has mastered detection. It has even gotten pretty good at prioritization, or so vendors like to claim. But let’s be real: Detection without ...
Like the Buddy System in The Simpsons, SMS authentication was only foolproof if everything went right. But when both “buddies” could be compromised at the same time, the entire system was doomed to fail.
The post The Buddy System: Why Google ...
A massive malvertising campaign that targeted individuals watching pirated videos on illegal streaming sites redirected them several times before landing them at GitHub repositories that hosted infostealers and other malware, according to ...
Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data.
The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.
In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs.
The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek.
How Garvey K-8 School District Partners with ManagedMethods to Keep Data Secure and Students Safe in Google Workspace As a K-8 district, Garvey School District is on a mission. Not only are its 500 staff members responsible for providing a ...
GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.
The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.
SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure. By leveraging SimSpace’s realistic simulated environments, organizations can perform comprehensive security ...
The SEC is getting serious about cybersecurity. Recent regulations and high-profile cases signal a new era of accountability for publicly listed companies. But how do you prepare? How do you protect your business and stay on the right side of the ...
Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.
The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek.
In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on DevOps.dev »
In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on Medium »
In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion — a significant 22% increase from the losses in 2022.
Related: Closing the resiliency gap
Unsurprisingly, experts predict this ...
The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the January updates addressing 100+ vulnerabilities, we saw 37 CVEs fixed in Windows 11 and 33 CVEs in Windows 10. This ...
A strong email strategy isn’t just about great content—it’s about ensuring your emails reach inboxes. Learn how DMARC improves deliverability and gives you a competitive edge in 2025.
The post Email Strategy & DMARC: How to Stay Ahead ...
Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative to commercial tools like Burp Suite Pro. Built with the needs of penetration testers, security professionals, and bug bounty hunters in mind, Hetty ...
Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The data can often still be recovered if devices are erased without proper ...
Overview In recent years, with the wide application of open-source LLMs such as DeepSeek and Ollama, global enterprises are accelerating the private deployment of LLMs. This wave not only improves the efficiency of enterprises, but also increases ...
Explore industry moves and significant changes in the industry for the week of March 10, 2025. Stay updated with the latest industry trends and shifts.