Application Security News and Articles


ENGlobal Says Personal Information Accessed in Ransomware Attack

ENGlobal has informed the SEC that personal information was compromised in a November 2024 ransomware attack. The post ENGlobal Says Personal Information Accessed in Ransomware Attack appeared first on SecurityWeek.

Ransomware Threats, Led by FunkSec, Rise to New Heights

Ransomware attacks surged to a record high in December 2024, with 574 incidents reported, according to an NCC Group report. FunkSec, a newly identified group combining hacktivism and cybercrime, accounted for over 100 attacks (18% of the total), ...

SonicWall Confirms Exploitation of New SMA Zero-Day

SonicWall has confirmed that an SMA 1000 zero-day tracked as CVE-2025-23006 has been exploited in the wild. The post SonicWall Confirms Exploitation of New SMA Zero-Day appeared first on SecurityWeek.

Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)

Apple has shipped a fix for a zero-day vulnerability (CVE-2025-24085) that is being leveraged by attackers against iPhone users. About CVE-2025-24085 CVE-2025-24085 is a use after free bug in CoreMedia, a framework used by Apple devices for the ...

Protecting Airlines: How to Stop Scraping and Loyalty Fraud

Cybercriminals are coming for your loyalty points and messing with dynamic pricing—don’t let them win. Learn how to stay ahead and keep your customers protected. The post Protecting Airlines: How to Stop Scraping and Loyalty Fraud appeared ...

Apple Patches First Exploited iOS Zero-Day of 2025

Apple has released fixes for dozens of vulnerabilities in its mobile and desktop products, including an iOS zero-day exploited in attacks. The post Apple Patches First Exploited iOS Zero-Day of 2025 appeared first on SecurityWeek.

How to Mitigate a DDoS Attack: A Comprehensive Guide for Businesses

Explore DDoS mitigation, from choosing providers to understanding network capacity, latency, SLAs, and how solutions like DataDome can protect your assets The post How to Mitigate a DDoS Attack: A Comprehensive Guide for Businesses appeared first ...

Google Issues Cloud Security Wake-Up Call as Threats Evolve

A report published by Google Cloud found nearly half (46%) of the observed security alerts involved a service account that was overprivileged. The post Google Issues Cloud Security Wake-Up Call as Threats Evolve appeared first on Security Boulevard.

Compliance Scorecard Version 7 simplifies compliance management for MSPs

Compliance Scorecard released Compliance Scorecard Version 7. This latest release is designed to seamlessly integrate compliance into cybersecurity offerings, delivering new features that simplify and enhance compliance management for MSPs and ...

How Sanoma Saves Time & Protects User Accounts from Credential Stuffing Attacks

Discover how Sanoma reduced credential stuffing attacks by 99% with DataDome's real-time cyberfraud protection, while enjoying the benefits of easy integration and major time savings. The post How Sanoma Saves Time & Protects User Accounts ...

Security Risks of Low-altitude Economy

The low-altitude economy is becoming an important force to promote economic growth by virtue of its innovative ability and huge development potential. From UAV logistics distribution to urban air traffic, from emergency rescue to aerial ...

Certificate Management Self-Service Capabilities to Simplify Access and Boost Efficiency

Organizations today operate in dynamic and fast-paced environments, where multiple cross-functional teams are working together to develop, deploy, and manage infrastructure, cloud services and applications. These teams need digital certificates ...

What Makes This “Data Privacy Day” Different?

As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Strategist, wants to remind us that we live in a digital world and that we need to protect it. With data breaches a daily occurrence, and AI ...

BloodyAD: Open-source Active Directory privilege escalation framework

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege escalation techniques within Active Directory environments. Features ...

74% of CISOs are increasing crisis simulation budgets

In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing their organisation’s readiness to manage a potential “chaos” of a full-scale ...

Cybersecurity jobs available right now: January 28, 2025

Application Security Engineer Bumble | United Kingdom | Hybrid – View job details As an Application Security Engineer, you will design and implement security testing tools within CI/CD pipelines to detect vulnerabilities early ...

U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5

The DOJ, which has move aggressively over the past year to find and shut down North Korea's numerous IT worker scams, indicts two U.S. citizens and three others for running a six-year operation the stole more than $866,000 from 10 U.S. companies ...

BTS #44 – Network Appliances: A Growing Concern

In this episode, Paul Asadoorian and Chase Snyder discuss the latest security threats and vulnerabilities affecting network appliances, particularly focusing on Avanti and Fortinet platforms. They explore the increasing risks associated with ...

Is Your Vulnerability Management Strategy Doing More Harm than Good?

Most organizations believe they have a solid process for managing vulnerabilities and exposures. Yet attackers continue to exploit vulnerabilities as one of the most common paths to breaches. This isn’t because these organizations use ...

AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability

Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI ...