Application Security News and Articles


The Field Engineer’s Handbook: Configuring an Arista Networks Switch with Splunk

Transform your network monitoring capabilities with the powerful combination of Arista Networks' advanced telemetry and Splunk's powerful analytics platform. This comprehensive guide will walk you through establishing a robust integration between ...

Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations

General Availability of Improved Analysis Algorithm and Security Posture Management Improvements The BloodHound team previewed several concepts in the last couple of releases that made it easier for customers to visualize attack paths and show ...

Navigating Firewall Security Policy Challenges in Technology Organizations: How FireMon Simplifies Complexity

In the technology sector, innovation and agility are key drivers of success. Organizations in this field lead the charge in adopting cutting-edge architectures like hybrid clouds, microservices, and DevSecOps practices.... The post Navigating ...

Networks hosting botnet C&Cs: Same players, same problems

With every Botnet Threat Update we publish, the same networks consistently appear in the Top 20 for hosting botnet command and control (C&C) servers. But why does this keep happening? In this Botnet Spotlight, we look into the root causes ...

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached ...

SAP Releases 21 Security Patches

SAP has released 19 new and two updated security notes on its February 2025 patch day, including six notes for high-severity vulnerabilities. The post SAP Releases 21 Security Patches appeared first on SecurityWeek.

DEF CON 32 – Eradicating Hepatitis C With BioTerrorism

Authors/Presenters: Mixæl Swan Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

The Rise of Typhoon Cyber Groups

Threats to Critical Infrastructure and the Role of Infrastructure Intelligence While cybersecurity has generally been top-of-mind, and many reports outline both increasing attacks and increasingly complexity of attacks,  among the most ...

Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators

Law enforcement agencies take down the 8Base ransomware group’s infrastructure, arrest four Russian operators. The post Authorities Disrupt 8Base Ransomware, Arrest Four Russian Operators appeared first on SecurityWeek.

8Base ransomware group leaders arrested, leak site seized

The Thai police has arrested four individuals suspected of being the leaders of the 8Base ransomware group and of stealing approximately $16 million from 1,000+ victims they targeted with the Phobos ransomware. “Officers from Cyber Crime ...

Industrial Defender 8.0 offers detailed view of OT environments

Industrial Defender announced its latest platform, Industrial Defender 8.0. This release introduces a completely redesigned risk dashboard, helping critical infrastructure and industrial operators manage security and compliance risks by assessing ...

Intel Patched 374 Vulnerabilities in 2024

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects. The post Intel Patched 374 Vulnerabilities in 2024 appeared first on SecurityWeek.

Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers

Dozens of local newspapers owned by media company Lee Enterprises experienced disruptions as a result of a cyberattack.  The post Cyberattack on Lee Enterprises Causes Disruptions at Dozens of Newspapers appeared first on SecurityWeek.

Alabama Man Pleads Guilty to Hacking SEC’s X Account

Eric Council Jr. pleaded guilty to hacking the X (formerly Twitter) account of the US Securities and Exchange Commission. The post Alabama Man Pleads Guilty to Hacking SEC’s X Account appeared first on SecurityWeek.

US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave

Staffers at the nation’s cybersecurity agency whose job is to ensure the security of US elections have been placed on administrative leave. The post US Cyber Agency Puts Election Security Staffers Who Worked With the States on Leave appeared ...

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials

A hacker recently offered to sell 20 million OpenAI credentials, but the data likely comes from information stealers, not the AI firm’s systems. The post OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials ...

Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)

Users of iPhones and iPads that run iOS/iPadOS 18 and iPadOS 17 are urged to implement the latest updates to plug a security feature bypass vulnerability (CVE-2025-24200) exploited in the wild in “an extremely sophisticated” attack. ...

Arvest Bank CISO on building a strong cybersecurity culture in banking

In this Help Net Security interview, Mike Calvi, CISO at Arvest Bank, discusses building a strong cybersecurity culture within the banking sector. He explains how leadership, effective reporting, and proactive engagement with associates are key ...

Review: Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition by Jeffrey Caruso explores how nation-states, corporations, and hackers engage in digital warfare. It offers insights into the intersection of cybersecurity, geopolitics, and emerging technology. About the author ...

How to detect and disable Apple AirTags that might be tracking you

Apple’s AirTags are a convenient way to track personal items like keys and bags, but they also raise concerns about unwanted tracking and stalking. To help users stay safe, Apple has implemented several anti-stalking protections, including ...