Application Security News and Articles


Phishing: A Persistent Threat in the Age of AI

Phishing is one of the most common and dangerous cyber threats facing organizations today. Despite growing awareness, employees often still fall victim to these attacks. Even worse, cybercriminals now have more sophisticated tools at their ...

A Guide to Security Investments: The Anatomy of a Cyberattack

Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage. The post A Guide to Security Investments: The Anatomy of a Cyberattack ...

Patch Tuesday Update – March 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 57 CVEs, and republished 10 additional CVEs, including 6 Zero-Day, 6 Critical, and 50 Important—with 6 Zero-Days actively exploited in the wild. From an ...

BSides Exeter 2024 – Purple Track – The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies

Author/Presenter: Richard Foster Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Zoom Patches 4 High-Severity Vulnerabilities

Zoom has patched five vulnerabilities in its applications, including four high-severity flaws. The post Zoom Patches 4 High-Severity Vulnerabilities appeared first on SecurityWeek.

Fraud Losses Reached $12.5 Billion in 2024: FTC 

FTC says reported losses to fraud exceeded $12.5 billion in 2024, with $5.7 billion lost to investment scams. The post Fraud Losses Reached $12.5 Billion in 2024: FTC  appeared first on SecurityWeek.

Hidden threats lurk in commercial software: How to manage risk

Your IT department just received notice that your network switches received a signed OS update that included feature improvements and fixes for security vulnerabilities. That’s good news, right?  The post Hidden threats lurk in commercial ...

Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Exploiting trust in the DeepSeek brand, scammers attempt to harvest personal information or steal user credentials. The post Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers appeared first on SecurityWeek.

Everything While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca

Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing. In the past, she’s worked in ...

Sysdig Report Details Scope of Cybersecurity Challenges

A report published today by Sysdig finds that 60% of organizations maintain risky service accounts that have administrator-level access without implementing rotating access keys. The post Sysdig Report Details Scope of Cybersecurity Challenges ...

How to maintain security compliance at a Fintech: A complete guide

If you're responsible for security at a financial services or fintech company, here is your comprehensive overview of what you need to do to be compliant. The post How to maintain security compliance at a Fintech: A complete guide appeared first ...

AI Network Security for Enterprises

Artificial intelligence (AI) is revolutionizing the way enterprises approach network security. With cyber threats evolving at an unprecedented rate, businesses may consider implementing AI-driven security solutions to optimize resources ...

NIST Releases New Report on Crypto-Agility – What You Need to Know Now

If you’re keeping up with post-quantum cryptography (PQC), here’s some big news: The U.S. National Institute of Standards and Technology (NIST) has released a fresh initial public draft of a Cybersecurity Whitepaper titled Considerations for ...

How to Prevent Magecart Attacks from Stealing Customer Payment Data

Learn how Magecart attacks steal credit card data and how you can protect your business with client-side third-party management, & PCI DSS 4.0 compliance solutions. The post How to Prevent Magecart Attacks from Stealing Customer Payment Data ...

Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation

San Jose, United States / California, 12th March 2025, CyberNewsWire The post Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation appeared first on Security Boulevard.

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems. The post China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days appeared first on SecurityWeek.

Fortinet Patches 18 Vulnerabilities 

Fortinet has published 17 new advisories to inform customers about 18 vulnerabilities patched in its products. The post Fortinet Patches 18 Vulnerabilities  appeared first on SecurityWeek.

Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections

The Trump administration has cut millions of dollars in federal funding from two cybersecurity initiatives, including one dedicated to helping state and local election officials. The post Trump Administration Halts Funding for Two Cybersecurity ...

Newly Patched Windows Zero-Day Exploited for Two Years

Microsoft on Tuesday patched a zero-day vulnerability in the Windows Win32 kernel that has been exploited since March 2023. The post Newly Patched Windows Zero-Day Exploited for Two Years appeared first on SecurityWeek.

PowerSchool Portal Compromised Months Before Massive Data Breach

Hackers used compromised credentials to access PowerSchool’s PowerSource portal months before the December 2024 data breach. The post PowerSchool Portal Compromised Months Before Massive Data Breach appeared first on SecurityWeek.