Application Security News and Articles


5 Must-Know Insights to Help Understand, and Prevent, Financial Cyber Attacks

The post 5 Must-Know Insights to Help Understand, and Prevent, Financial Cyber Attacks appeared first on Votiro. The post 5 Must-Know Insights to Help Understand, and Prevent, Financial Cyber Attacks appeared first on Security Boulevard.

Securing the Code You Rely On: Best Practices for Managing Dependencies and Libraries in the SSDLC

by Revel Aldwin (DevSecOps Consultant at ITSEC Asia)Continue reading on Medium »

Defense Contractor MORSE to Pay $4.6M to Settle Cybersecurity Failure Allegations

US defense contractor MORSE Corp has agreed to pay $4.6 million to settle allegations over its cybersecurity failures.  The post Defense Contractor MORSE to Pay $4.6M to Settle Cybersecurity Failure Allegations appeared first on SecurityWeek.

Innovation is Not Black and White – How To See in Full Color

You cannot truly appreciate color if you have only ever seen black and white. Too many businesses operate in a world of rigid processes, predictable...Read More The post Innovation is Not Black and White – How To See in Full Color appeared ...

Ransomware Groups Increasingly Adopting EDR Killer Tools

ESET uncovers a link between RansomHub, Play, Medusa, and BianLian ransomware gangs as more groups adopt tools to disable EDR software. The post Ransomware Groups Increasingly Adopting EDR Killer Tools appeared first on SecurityWeek.

Reality Bites: You’re Only as Secure as Your Last API Deployment

In agile and DevOps-driven environments, APIs are frequently updated to meet evolving business demands, from adding new features to addressing performance issues. However, each deployment introduces potential security risks, as new code, ...

CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825)

CrushFTP has fixed a critical vulnerability (CVE-2025-2825) in its enterprise file transfer solution that could be exploited by remote, unauthenticated attackers to access vulnerable internet-facing servers (and likely the data stored on them). ...

T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit

T-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek.

Business Email Compromise, ACH Transactions, and Liability

Business Email Compromise (BEC) fraud represents one of the most insidious threats facing businesses and individuals today. The post Business Email Compromise, ACH Transactions, and Liability appeared first on Security Boulevard.

More Solar System Vulnerabilities Expose Power Grids to Hacking 

Forescout has found dozens of vulnerabilities in solar power systems from Sungrow, Growatt and SMA. The post More Solar System Vulnerabilities Expose Power Grids to Hacking  appeared first on SecurityWeek.

AI Security Firm Straiker Emerges From Stealth With $21M in Funding

Straiker has emerged from stealth mode with a solution designed to help enterprises secure AI agents and applications. The post AI Security Firm Straiker Emerges From Stealth With $21M in Funding appeared first on SecurityWeek.

Famous Data Breaches & Phishing Attacks: What We Can Learn

Explore major data breaches and phishing attacks, their impact, and key lessons. Learn how companies fell victim and how to protect against such threats. The post Famous Data Breaches & Phishing Attacks: What We Can Learn appeared first on ...

DPRK IT Worker Scam: Mitigation Steps for Hiring Teams

Nisos DPRK IT Worker Scam: Mitigation Steps for Hiring Teams Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Singaporean, Turkish, Finish and US nationals with the goal of obtaining employment in remote ...

runZero’s expanded platform offers new approach to detecting and prioritizing risk

runZero releases new product capabilities, welcomes executive leadership with deep industry expertise, and gains channel momentum. runZero’s expanded platform offers a new approach to effectively manage the risk lifecycle, enabling security ...

The FFIEC’s Origins and Purpose for Banking Industry

The Federal Financial Institutions Examination Council (FFIEC) plays a pivotal role in ensuring the safety, soundness, and efficiency of financial institutions in the United States. Founded in 1979, the FFIEC operates as an interagency regulatory ...

RFID Hacking: Exploring Vulnerabilities, Testing Methods, and Protection Strategies

Radio-Frequency Identification (RFID) technology is everywhere—powering everything from contactless payments and inventory tracking to access control systems. But while RFID systems makes life more convenient, it also introduces serious ...

GetReal Security platform combats AI-fueled attacks

GetReal Security launched unified platform to help enterprises, government agencies and media organizations manage risk and mitigate threats from the growing presence of AI-fueled attacks. The platform brings together GetReal’s products and ...

My enlightening journey through week 6 of the AWS cohort#7

A Quirky Ice Breaker and Warm BeginningsContinue reading on Medium »

Kubernetes Ingress-nginx Remote Code Execution Vulnerability (CVE-2025-1974)

Overview Recently, NSFOCUS CERT detected that Kubernetes issued a security announcement and fixed the Kubernetes Ingress-nginx remote code execution vulnerability (CVE-2025-1974). The Ingress controller deployed in Kubernetes Pod can be accessed ...

The hidden costs of security tool bloat and how to fix it

In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks. Buckley shares insights on how deep ...