Application Security News and Articles


Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation

Redmond’s threat hunters found 394,000 Windows systems talking to Lumma controllers, a victim pool included global manufacturers.  The post Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation appeared first on ...

What Kind of Identity Should Your AI Agent Have?

7 min readAI agents don’t neatly fit into your IAM chart. They switch roles, borrow authority, and rewrite what identity means at runtime. Here's what that means for you. The post What Kind of Identity Should Your AI Agent Have? appeared first ...

Lumma Stealer Malware-as-a-Service operation disrupted

A coordinated action by US, European and Japanese authorities and tech companies like Microsoft and Cloudflare has disrupted the infrastructure behind Lumma Stealer, the most significant infostealer threat at the moment. What is Lumma Stealer? ...

How 2024 will impact quality engineering teams

As we step into the new year, it's time to explore the exciting trends that will shape the world of Quality Engineering in 2024. Here’s what we’ve been seeing in our work with Quality Engineering teams around the globe. The post How 2024 will ...

The Role of AI in FinTech: Innovation, Transformation, and the Ethics You Can’t Ignore

The financial services industry is in the midst of a thrilling transformation, and Artificial Intelligence (AI) is the spark igniting it all! Picture this: in...Read More The post The Role of AI in FinTech: Innovation, Transformation, and the ...

Survey: Too Much Time Being Spent on Managing Cybersecurity Tools

A survey of 2,058 security leaders finds nearly half of respondents (46%) are spending more time maintaining tools than they do defending their organization from actual cyberattacks. The post Survey: Too Much Time Being Spent on Managing ...

LLM03: Supply Chain – FireTail Blog

May 21, 2025 - Lina Romero - LLM03: Supply Chain 20/5/2025 Excerpt The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each ...

Breach Readiness in a World That’s Always Connected

Rajesh Khazanchi, CEO & Co-founder of ColorTokens, explains how microsegmentation keeps critical services running in hyper-connected world, delivering true breach readiness and business resilience. The post Breach Readiness in a World ...

Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535. The post Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway appeared first on SecurityWeek.

BSidesLV24 – GroundFloor – Insert Coin: Hacking Arcades For Fun

Authors/Presenters: Ignacio Navarro Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025

MEDIA ADVISORY Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025 Gerry Gebel to join fellow AuthZEN co-chairs to discuss next-gen authorization interoperability and open standards BOULDER, Colo., ...

Email Spoofing Security

Email spoofing security is an imperative addition to your email’s security posture, here’s why. Email spoofing is a form of internet fraud. Leverage email authentication tools to enhance your domain’s email spoofing security. The post Email ...

Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December. The post Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users appeared first on SecurityWeek.

Data-stealing VS Code extensions removed from official Marketplace

Developers who specialize in writing smart (primarily Ethereum) contracts using the Solidity programming language have been targeted via malicious VS Code extensions that install malware that steals cryptocurrency wallet credentials. “Based ...

Cloud Data Protection: How DSPM Helps You Discover, Classify and Secure All Your Data Assets

In this fourth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM ...

Anchore SBOM tracks software supply chain issues

Anchore announced the next phase of its SBOM strategy with the release of Anchore SBOM. With the addition of Anchore SBOM, Anchore Enterprise now provides a centralized platform for viewing, managing and analyzing Software Bill of Materials ...

Boost VM security: 8 key strategies

Virtual machines (VMs) have become ubiquitous in the enterprise by offering flexibility, scalability, and cost savings. But widespread adoption has outpaced traditional security controls, which often rely on runtime access or agent-based ...

The OWASP LLM Top 10 and Sonatype: Data and model poisoning

Artificial intelligence (AI) continues to redefine what is possible in software, from predictive models to generative content. But as AI systems grow in power, so too do the threats targeting their foundations, including a particularly insidious ...

Protecting Against Brand Impersonation Attacks with Browser Detection and Response

By Tejeswara S Reddy, Security Researcher, SquareX Brand impersonation attacks occur when threat actors create convincing replicas of legitimate websites, communications, or digital assets to deceive users into believing they are interacting ...