Application Security News and Articles


BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN

Author/Presenter: Per Thorsheim Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Russian Government Hackers Caught Buying Passwords from Cybercriminals

Microsoft flags a new Kremlin hacking team buying stolen usernames and passwords from infostealer markets for use in cyberespionage attacks.  The post Russian Government Hackers Caught Buying Passwords from Cybercriminals appeared first on ...

Ongoing Campaign Uses 60 NPM Packages to Steal Data

Security firm Socket warns flags a campaign targeting NPM users with tens of malicious packages that can hijack system information. The post Ongoing Campaign Uses 60 NPM Packages to Steal Data appeared first on SecurityWeek.

DefectDojo’s SOC capabilities simplify cybersecurity operations

DefectDojo announced next-gen Security Operations Center (SOC) capabilities for DefectDojo Pro, which provides both SOC and AppSec professionals a unified platform for noise reduction and prioritization of SOC alerts and AppSec findings. As both ...

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group

The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and commercial entities in Europe and North America, and they dubbed it Laundry Bear. ...

Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack

The agencies said that the group, which they called Laundry Bear, is actively trying to steal sensitive data from EU and NATO countries and is “extremely likely Russian state supported.” The post Dutch Intelligence Agencies Say Russian ...

New MCP server from groundcover redefines LLM observability

A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform. Developers can now enhance their AI-driven workflows with deep system context, powered by groundcover’s granular ...

Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next

As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz. The post Inside the $111 Billion Cloud Security Market: Acquisition, ...

Vulnerabilities found in NASA’s open source software

Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems, claims Leon Juranić, security researcher and founder of cybersecurity startup ThreatLeap. The vulnerabilities Juranić, whose ...

How to Stop AI from Scraping Your Website

Learn effective methods to block AI from scraping and using your content from simple robots.txt directives to advanced bot management solutions. The post How to Stop AI from Scraping Your Website appeared first on Security Boulevard.

Detection as code: How to enhance your real-time threat detection

Detection as code (DaC) is a powerful way for security teams to streamline rule development, automate threat detection, and respond to attacks with greater speed and precision. The DaC approach applies formal software development practices to ...

AI in K-12 Cybersecurity: Hype or Helpful?

Not all AI is created equal. Here’s how cybersecurity AI actually helps defend your district. From predictive grading tools to personalized learning platforms, artificial intelligence (AI) is quickly making its mark in K-12 education. But what ...

Software Engineering Certifications Rolling Out Soon

In our last episode, Trace Bannon and Dan Whitliff established the need for certifying critical system software engineers just as we certify engineers in chemical, architectural, mechanical and other safety-critical verticals.  In this show, we ...

Law Firms Warned of Silent Ransom Group Attacks

The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry. The post Law Firms Warned of Silent Ransom Group Attacks appeared first on SecurityWeek.

What is an SSL stripping attack and how to prevent it

SSL stripping is a man-in-the-middle attack that downgrades secure HTTPS connections to HTTP, exposing sensitive user data. This article explains how the attack works and outlines the best technical and strategic measures businesses and users can ...

Coinbase Hit with Lawsuit Over $400M Data Breach and Stock Loss

Coinbase faces a class action lawsuit over a data breach. Learn about the implications for investors and the importance of secure authentication. The post Coinbase Hit with Lawsuit Over $400M Data Breach and Stock Loss appeared first on Security ...

Massive Data Breach Exposes 184 Million Login Credentials

A major data breach exposed 184 million login credentials. Discover the risks and learn how to protect yourself from cyber threats. The post Massive Data Breach Exposes 184 Million Login Credentials appeared first on Security Boulevard.

Why Email Aliases Fail DMARC (And How to Fix Them)

Struggling with DMARC alias failures? Learn why your alias emails get blocked and how to fix SPF&DKIM alignment for better deliverability. The post Why Email Aliases Fail DMARC (And How to Fix Them) appeared first on Security Boulevard.

Why app modernization can leave you less secure

Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards ...

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about ...