Application Security News and Articles


Second OttoKit Vulnerability Exploited to Hack WordPress Sites

Threat actors are targeting a critical-severity vulnerability in the OttoKit WordPress plugin to gain administrative privileges. The post Second OttoKit Vulnerability Exploited to Hack WordPress Sites appeared first on SecurityWeek.

An Evening of Browser Security: SquareX’s RSAC Networking Dinner

Engaging the cybersecurity community As part of our activities at RSAC 2025 Conference, SquareX hosted an exclusive networking dinner for CISOs and security leaders at the St. Francis Yacht Club. The event brought together forward-thinking ...

US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations

The US government warns of threat actors targeting ICS/SCADA systems at oil and natural gas organizations. The post US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations appeared first on SecurityWeek.

SquareX at BSidesSF and RSAC 2025 Conference

Bringing Browser Security to the Forefront What a week it’s been! The SquareX team just returned from San Francisco where we attended two back-to-back cybersecurity events: BSides SF and RSAC 2025 Conference. These events gave us the perfect ...

41 Countries Taking Part in NATO’s Locked Shields 2025 Cyber Defense Exercise

The NATO Cooperative Cyber Defence Centre of Excellence in Estonia is hosting the Locked Shields 2025 cyber defense exercise. The post 41 Countries Taking Part in NATO’s Locked Shields 2025 Cyber Defense Exercise appeared first on SecurityWeek.

Digital welfare fraud: ALTSRUS syndicate exploits the financially vulnerable

A new report from bot defense firm Kasada has exposed the growing threat of ALTSRUS, a fraud syndicate targeting some of the most vulnerable corners of the digital economy. Researchers revealed how the group has scaled its operations to steal and ...

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules

Application security is changing fast. In this Help Net Security interview, Loris Gutic, Global CISO at Bright, talks about what it takes to keep up. Gutic explains how DevOps, containers, and serverless tools are shaping security, and shares ...

Autorize: Burp Suite extension for automatic authorization enforcement detection

Autorize is an open-source Burp Suite extension that checks if users can access things they shouldn’t. It runs automatic tests to help security testers find authorization problems. Autorize installation To use Autorize, you’ll need Burp ...

Using Blob URLs to Bypass SEGs and Evade Analysis

Starting in mid-2022, Cofense Intelligence detected a new technique for successfully delivering a credential phishing page to a user’s inbox: blob URIs (Uniform Resource Identifier).  The post Using Blob URLs to Bypass SEGs and Evade Analysis ...

1 in 3 workers keep AI use a secret

Employees are feeling heightened concerns around the use of technology to enhance productivity, as well as job dissatisfaction and a lack of motivation at work. In fact, 30% of employees who use GenAI tools at work worry their job may be cut and ...

Personal data of top executives easily found online

The personal information of 75% of corporate directors can be found on people search sites, according to Incogni. People search sites claim to reveal a variety of personal details, including public records, phone numbers, and even property ...

Smart Strategies for NHI Deployment

Why Does NHI Management Matter in Today’s Cybersecurity Landscape? Data breaches, hacking and cyber threats are at an all-time high, making cybersecurity a crucial priority for businesses. So, how can organizations effectively secure their ...

Your NHI Management Is Getting Better

Is NHI Management Integral to Your Cybersecurity Strategy? Reevaluating your cybersecurity strategy is crucial. At the core of these strategies, Non-Human Identities (NHIs) and Secrets Management serve as a pivotal aspect to comprehend. But how ...

Can NHIs Handle My Enterprise Needs?

Can Non-Human Identities (NHIs) Handle Your Enterprise Needs? The pressing question in many cybersecurity professionals’ minds is: Will the management of Non-Human Identities (NHIs) and their secrets translate into a robust security strategy ...

Urgent Warning for Gmail Users: 1.8 Billion Accounts at Risk

Urgent warning for 1.8 billion Gmail users! Protect your account from sophisticated hacks with essential security measures. Act now! The post Urgent Warning for Gmail Users: 1.8 Billion Accounts at Risk appeared first on Security Boulevard.

The Rise of AI-Powered Bots in Payment Fraud & How FinTechs Can Protect Themselves

Discover how fintechs are using AI-driven protection to stop payment fraud and stay ahead of evolving cyber threats. The post The Rise of AI-Powered Bots in Payment Fraud & How FinTechs Can Protect Themselves appeared first on Security Boulevard.

BSidesLV24 – Proving Ground – A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations

Author/Presenter: Lenin Alevski Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Opening Up Open Banking: The CFPB’s Personal Financial Data Rights Rule

Opening Up Open Banking: The CFPB's Personal Financial Data Rights Rule andrew.gertz@t… Tue, 05/06/2025 - 18:23 Explore the impact of the CFPB’s new Personal Financial Data Rights rule and how it aims to empower consumers, drive ...

Cyberwarfare Funding Accelerates and Everyone is at Risk

  Nations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In ...

Daniel Stori’s Turnoff.US: ‘mastering regexp’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘mastering regexp’ appeared first on Security Boulevard.