Application Security News and Articles


Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation

Rapid7 finds a new zero-day vulnerability in PostgreSQL and links it to chain of attacks against a BeyondTrust Remote Support product. The post Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation appeared first on SecurityWeek.

DEF CON 32 – MFT Malicious Fungible Tokens

Authors/Presenters: Mauro Eldritch, Cybelle Oliveira Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors

Poland is being targeted by various forms of cyberattacks and sabotage actions believed to be sponsored by Russia. The post Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors appeared first on SecurityWeek.

Energy Regulations Are Rising: Stay Ahead with Modern DCIM

As data centers continue to serve as the backbone of the digital economy, they face an escalating challenge: the tightening grip of global energy consumption regulations. Governments and regulatory bodies worldwide are implementing stricter ...

How DataDome Defended a Marketplace with 90 Million Users from Flash DDoS Attacks

A leading online marketplace with 90M+ users faced two Flash DDoS attacks. See how DataDome blocked them in milliseconds at the edge, ensuring zero disruption. The post How DataDome Defended a Marketplace with 90 Million Users from Flash DDoS ...

Generative AI-centric technologies: Get Gartner® report

Artificial intelligence (AI) continues to revolutionize how businesses operate, with generative AI (GenAI) technologies taking center stage as critical enablers for innovation. The post Generative AI-centric technologies: Get Gartner® report ...

Daniel Stori’s Turnoff.US: ‘git submodules adoption flows’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘git submodules adoption flows’ appeared first on Security Boulevard.

Grip Security Adds SaaS Security Posture Management Offering

Grip Security today extended its portfolio of tools for securing software-as-a-service (SaaS) applications to provide an ability to proactively identify misconfigurations and enforce best cybersecurity practices. The post Grip Security Adds SaaS ...

What developers think about application security might surprise you

Cybersecurity is often viewed from the point of view of practitioners, which is why the DevSecOps company Jit took a different tack on the subject — and asked developers about their views on application security (AppSec). The post What ...

Circuit Board Maker Unimicron Targeted in Ransomware Attack

The Sarcoma ransomware group is threatening to leak data stolen from Taiwanese printed circuit board manufacturer Unimicron. The post Circuit Board Maker Unimicron Targeted in Ransomware Attack appeared first on SecurityWeek.

Sophos Sheds 6% of Employees After Closing Secureworks Deal

Cybersecurity firm Sophos closed its $859 million acquisition of Secureworks earlier this month and soon after cut 6% of the combined company's workforce, with many of job losses related to either overlapping positions created by the deal or ...

Technical Analysis of Xloader Versions 6 and 7 | Part 2

This is Part 2 of our two-part technical analysis on Xloader versions 6 and 7. For details on how Xloader conceals its critical code and data, go to Part 1.IntroductionIn Part 2 of this blog series, we examine how Xloader obfuscates the ...

North Korean hackers spotted using ClickFix tactic to deliver malware

North Korean state-sponsored group Kimsuky (aka Emerald Sleet, aka VELVET CHOLLIMA) is attempting to deliver malware to South Korean targets by leveraging the so-called “ClickFix” tactic. A relatively new tactic The ClickFix social ...

Application Detection and Response (ADR) Gives the SOC Deep Visibility into the Application Layer | Contrast Security

The life of a Security Operations Center (SOC) analyst is often compared to navigating a vast and dangerous ocean. While tools like Intrusion Detection Systems (IDS), Cloud-Native Application Protection Platforms (CNAPP), and Endpoint Detection ...

DEF CON 32 – GPS Spoofing It’s About Time, Not Just Position

Authors/Presenters: Ken Munro Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Future of AI Agent Authentication: Ensuring Security and Privacy in Autonomous Systems

Dive into the world of AI agent authentication, where cutting-edge security meets autonomous systems. Discover how delegation tokens, real-time verification, and multi-layer security protocols work together to ensure safe and private AI ...

CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security

CyberArk acquires early stage Boston startup Zilla Security for $165M, expanding its identity security and IGA capabilities. The post CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security appeared first on SecurityWeek.

How Infostealers Are Creating a Data Breach Epidemic

When threat actors get their hands on legitimate corporate credentials, it makes blocking unauthorized intrusions far more challenging. Yet that’s exactly what’s happening across the globe, thanks to the growing popularity of infostealer ...

DeepSeek Exposes Major Cybersecurity Blind Spot

Millions of uninformed users have flocked to DeepSeek and share personal information without considering security or privacy risks. The post DeepSeek Exposes Major Cybersecurity Blind Spot appeared first on SecurityWeek.

Palo Alto Networks Unifies Cloud Security Portfolio

Palo Alto Networks today updated its Cortex Cloud platform to integrate the company’s cloud-native application protection platform (CNAPP) known as Prisma Cloud into a platform that provides a wider range of cloud security capabilities. The ...