Application Security News and Articles


Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition

In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos. The post Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition appeared ...

Meta Paid Out Over $2.3 Million in Bug Bounties in 2024

Meta received close to 10,000 vulnerability reports and paid out over $2.3 million in bug bounty rewards in 2024. The post Meta Paid Out Over $2.3 Million in Bug Bounties in 2024 appeared first on SecurityWeek.

Overcoming Security Challenges in Real-Time APIs

Speed is everything in the modern business world. Our attention spans are shorter than ever, consumers demand short and seamless interactions, and the slightest delay in service delivery can see organizations fall far behind their competitors. ...

AI and Civil Service Purges

Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers are being encouraged to resign, and congressional mandates are being ...

In Other News: $10,000 YouTube Flaw, Cybereason CEO Sues Investors, New OT Security Tool

Noteworthy stories that might have slipped under the radar: Google pays $10,000 bug bounty for YouTube vulnerability, Cybereason CEO sues two investors, Otorio launches new OT security tool. The post In Other News: $10,000 YouTube Flaw, ...

Top 6 DMARC Tools in 2025

Choosing the right DMARC tool is essential for protecting your domain from email spoofing and phishing attacks. Explore the top DMARC tools and their features. The post Top 6 DMARC Tools in 2025 appeared first on Security Boulevard.

SonicWall Firewall Vulnerability Exploited After PoC Publication

The exploitation of a recent SonicWall vulnerability has started shortly after proof-of-concept (PoC) code was published. The post SonicWall Firewall Vulnerability Exploited After PoC Publication appeared first on SecurityWeek.

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks

China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad. The post Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks appeared first on ...

New Windows Zero-Day Exploited by Chinese APT: Security Firm

ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda.  The post New Windows Zero-Day Exploited by Chinese APT: Security Firm appeared first on SecurityWeek.

SGNL Raises $30 Million for Identity Management Solution

Identity management provider SGNL has raised $30 million in a Series A funding round led by Brightmind Partners. The post SGNL Raises $30 Million for Identity Management Solution appeared first on SecurityWeek.

Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure

Attempts to exploit CVE-2024-0108, an authentication bypass vulnerability in Palo Alto firewalls, started one day after disclosure.  The post Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure appeared first on SecurityWeek.

Grip Security unveils SSPM solution to strengthen SaaS security posture

Grip Security has unveiled its SaaS Security Posture Management (SSPM) solution, which proactively identifies misconfigurations, enforces best practices and strengthens SaaS security posture against emerging risks. Unlike traditional SSPM ...

Pig butchering scams are exploding

2024 is set to be a record year for scammers who received at least US$9.9 billion in crypto revenues from their illicit activities, according to Chainalysis. This figure is projected to rise to an all-time high of $12.4 billion as ongoing ...

Inconsistent security strategies fuel third-party threats

47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute. Third-party security incidents persist Notably, 64% ...

New infosec products of the week: February 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Armor, EchoMark, Netwrix, Palo Alto Networks, and Socure. Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats ...

Palo Alto Networks PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)

Overview Recently, NSFOCUS CERT detected that Palo Alto Networks issued a security announcement and fixed the identity bypass vulnerability in PAN-OS (CVE-2025-0108). Due to the problem of path processing by Nginx/Apache in PAN-OS, ...

Microsoft Security Update Notification in February of High-Risk Vulnerabilities in Multiple Products

Overview On February 12, NSFOCUS CERT detected that Microsoft released a security update patch for February, which fixed 63 security issues involving widely used products such as Windows, Microsoft Office, Azure, Apps, and Microsoft Visual ...

Choosing a DeFi Protocol: Risks, Red Flags, and Recommendations

A guide to walk you through the key steps in deciding which protocol to invest in and give you the tools to assess the risks. The post Choosing a DeFi Protocol: Risks, Red Flags, and Recommendations appeared first on Security Boulevard.

A New Chapter in Cybersecurity Excellence: Nuspire Becomes PDI Security & Network Solutions

In the rapidly evolving landscape of cybersecurity, transformation isn’t just about adaptation—it’s about strengthening capabilities to better serve and protect organizations worldwide. That’s why we’re excited to announce a ...

From Reactive to Predictive: Building Cyber Resilience for 2025

When you’re resilient to something, you don’t just endure; you adapt, recover, and emerge stronger. This idea is what should motivate companies to focus more on cyber resilience. It’s not enough to simply weather the storm of a cyberattack; ...