Application Security News and Articles


Ransomware Attack Ends a 150 Year Company

  Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books ...

DEF CON 32 – War Stories – Stranger In A Changed Land

Author/Presenter: Tony Sage Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives 

i-Soon employees charged with conducting extensive hacking campaigns on behalf of Beijing’s security services. The post US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives  appeared first on SecurityWeek.

Apple vs. UK — ADP E2EE Back Door Faceoff

Won’t Tim Think of the Children? End-to-end encryption battle continues. The post Apple vs. UK — ADP E2EE Back Door Faceoff appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘RNA’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘RNA’ appeared first on Security Boulevard.

Anti-detect browser analysis: How to detect the Undetectable browser?

This is the second article of our series about anti-detect browsers. In the first article, we gave an overview of anti-detect browsers, their main features and what they’re used for. In this second article, we do a deep dive into Undetectable, ...

Fueling the Fight Against Identity Attacks

When we founded SpecterOps, one of our core principles was to build a company which brought unique insight into high-capability adversary tradecraft, constantly innovating in research and tooling. We aspired to set the cadence of the cyber ...

SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform.  The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform  appeared first on ...

7 container security best practices

Properly securing containers has never been easy, but the rise of software supply chain attacks — and new threats coming from AI — makes additional security controls essential. Threats and risks must be identified and addressed before ...

The Rise of Digital Passports: Navigating the Security Implications

Delve into the world of digital passports, understanding their benefits, security challenges, and how they're transforming identity verification and travel experiences. The post The Rise of Digital Passports: Navigating the Security Implications ...

MixMode Uncovers Nation-State Attacks, Insider Threats, and Regulatory Risks in Critical Infrastructure Environment within 3 Days of Deployment

In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform. The post MixMode Uncovers Nation-State Attacks, ...

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks. The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on ...

The 5 stages of incident response grief

Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move on. That’s precisely what security teams need to do in the wake ...

DEF CON 32 – War Stories – Breaking Network Crypto In Popular Chinese Keyboard Apps

Author/Presenter: Jeffrey Knockel, Mona Wang Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Cybereason CEO Resigns Amid Funding Dispute with Investors

Eric Gan, who last month filed a lawsuit against top Cybereason investors for rejecting multiple financing plans, reportedly resigned as the company's CEO after months of turmoil within the cybersecurity company's boardroom. The post Cybereason ...

Eleven11bot Captures 86,000 IoT Devices for DDoS Attacks

The massive Eleven11bot has compromised more than 86,000 IoT devices, including security cameras and network video recorders, to launch hundreds of DDoS attacks, and security researchers say the threat actors behind the botnet are trying to grow ...

Iranian Hackers Target UAE Firms With Polyglot Files

An Iranian threat actor was seen targeting UAE organizations with polyglot files to deliver a new backdoor named Sosano. The post Iranian Hackers Target UAE Firms With Polyglot Files appeared first on SecurityWeek.

We’re losing — but it can’t get any worse, right?

We’re losing — but it can’t get any worse, right? LLMs are being used in many ways by attackers; how blind are you? We’re spending hundreds of billions and losing trillions in cybersecurity. The industry structure is partially to ...

North Korean Fake IT Workers Pose as Blockchain Developers on GitHub

North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms. The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek.

If Businesses Can’t Afford a Chief AI Officer? Here’s the Alternative Way

AI is a Necessity, But a Chief AI Officer Might Not Be Feasible Artificial Intelligence (AI) is transforming industries, optimizing operations, and redefining how businesses...Read More The post If Businesses Can’t Afford a Chief AI Officer? ...