Application Security News and Articles


ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices

A high severity vulnerability in DICOM, the healthcare industry’s standard file protocol for medical imaging, has remained exploitable years after its initial disclosure. The flaw enables attackers to embed malicious code within legitimate ...

Navigating New Cyber-Physical System Security Regulations

Cyber-Physical Systems (CPS) are no longer the stuff of science fiction; they are woven into the fabric of our daily lives, organizations, and critical infrastructure. From smart grids managing our power to the connected cars we drive and the ...

BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective

Authors/Presenters: Oreen Livni Shein, Elad Pticha Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany ...

MCP Servers in AI IDEs: The Good, the Risky, and the Local Option

You’re using an AI-powered IDE like Cursor, letting it write boilerplate, explain code, and even debug.Continue reading on Medium »

Hackers Breach Morocco’s Social Security Database

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan “harassment” of Algeria on social media platforms. The post Hackers Breach Morocco’s Social Security Database appeared first on SecurityWeek.

A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy

Redundancy in secrets management introduces risks, as well as operational complexity, ultimately undermining overall security maturity. The post A Security Leader’s Perspective on The Real Business Risks of Secrets Managers Redundancy appeared ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure your infrastructure. The safety net is shrinking, and those still waiting ...

Secure Coding : Introduction

The First Loophole: Insecure CodingContinue reading on Medium »

Vulnerability in OttoKit WordPress Plugin Exploited in the Wild

A vulnerability in the OttoKit WordPress plugin with over 100,000 active installations has been exploited in the wild. The post Vulnerability in OttoKit WordPress Plugin Exploited in the Wild appeared first on SecurityWeek.

In Other News: Scattered Spider Still Active, EncryptHub Unmasked, Rydox Extraditions

Noteworthy stories that might have slipped under the radar: Scattered Spider still active despite arrests, hacker known as EncryptHub unmasked, Rydox admins extradited to US.  The post In Other News: Scattered Spider Still Active, EncryptHub ...

How to Prove the ROI of Your Vulnerability Management Metrics to the Board?

The ROI of Vulnerability Management comes down to the metrics—these might sound boring, but they are the magic numbers that decide whether security spending should be considered a cost or... The post How to Prove the ROI of Your Vulnerability ...

Span Cyber Security Arena 2025: Infosec leaders to discuss the future of digital defense

Today, in the age of quantum threats, AI and sophisticated digital manipulations, the question is: where does the human factor end, and where does technology begin? This reality, primarily in the context of cybersecurity, will be discussed at the ...

SonicWall Patches High-Severity Vulnerability in NetExtender

SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug. The post SonicWall Patches High-Severity Vulnerability in NetExtender appeared first on SecurityWeek.

MSSP Cybersecurity Platform

Seceon, a leading MSSP (Managed Security Service Provider) cybersecurity platform company, steps up to this challenge by offering a next-generation platform that goes far beyond traditional security approaches. Seceon provides an advanced MSSP ...

1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative

Laboratory Services Cooperative says the personal and medical information of 1.6 million was stolen in an October 2024 data breach. The post 1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative appeared first on SecurityWeek.

Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike

At the start of this year, IRONSCALES launched an integration with CrowdStrike Falcon® Next-Gen SIEM, delivering enhanced threat visibility, detection, and correlation to help organizations combat phishing and account takeover (ATO) threats. ...

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek.

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Very few people in the cybersecurity industry do not know, or know of, Bryson Bort. Yes, he’s the CEO/Founder of SCYTHE, but he’s also the co-founder of ICS Village (the next one at RSA Conference from April 28 to May 1, 2025). This event, ...

Microsoft’s April Security Update of High-Risk Vulnerabilities in Multiple Products

Overview On April 9, NSFOCUS CERT detected that Microsoft released a security update patch for April, fixing 126 security problems in widely used products such as Windows, Microsoft Office, Azure, Microsoft Edge for iOS, Microsoft Visual Studio, ...

KELA Digital Cyber Analysts improves security teams’ efficiency

KELA unveiled Digital Cyber Analysts, next-generation AI-powered digital employees designed to transform how security teams consume, prioritize, and act on threat intelligence. These always-on, interactive agents enhance the speed and efficiency ...