Application Security News and Articles


Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison 

Kingsley Uchelue Utulu has been sentenced to more than 5 years in prison for his role in a scheme that involved hacking, fraud and identity theft. The post Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison  appeared first ...

New Zealand Government Mandates DMARC Under New Secure Email Framework

New Zealand mandates DMARC enforcement under its new Secure Government Email framework. Learn what this means and how agencies can ensure compliance. The post New Zealand Government Mandates DMARC Under New Secure Email Framework appeared first ...

NSFOCUS Releases 2024 Global DDoS Landscape Report

SANTA CLARA, Calif., June 9, 2025 – NSFOCUS, a global leader in cybersecurity solutions, announced the release of its annual report, the 2024 Global DDoS Landscape Report. The full report is packed with in-depth analysis and insights that can ...

Why MSSPs Must Prioritize Cyber Risk Quantification in 2025

Have you ever had a client ask, “How much risk are we facing?” and all you had was a pie chart to show them? In 2025, that doesn’t cut it. Today’s business executives expect more. They want risk explained in clear, unambiguous terms—and ...

Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies

President Trump says his new cybersecurity executive order amends problematic elements of Biden- and Obama-era executive orders. The post Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies appeared first on SecurityWeek.

Balancing cybersecurity and client experience for high-net-worth clients

In this Help Net Security interview, Renana Friedlich-Barsky, EVP and CISO at LPL Financial, discusses how threat actors are targeting high-net-worth clients and exploiting digital touchpoints in wealth management. She explains why firms must ...

CISOs, are you ready for cyber threats in biotech?

The threat landscape in the bioeconomy is different from what most CISOs are used to. It includes traditional risks like data breaches, but the consequences are more complex. A compromise of genomic databases, for example, does not just expose ...

fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic

fiddleitm is an open-source tool built on top of mitmproxy that helps find malicious web traffic. It works by checking HTTP requests and responses for known patterns that might point to malware, phishing, or other threats. fiddleitm features ...

Enterprise SIEMs miss 79% of known MITRE ATT&CK techniques

Using the MITRE ATT&CK framework as a baseline, organizations are generally improving year-over-year in understanding security information and event management (SIEM) detection coverage and quality, but plenty of room for improvement ...

Employees repeatedly fall for vendor email compromise attacks

In just 12 months, attackers attempted to steal more than $300 million via vendor email compromise (VEC), with 7% of engagements coming from employees who had engaged with a previous attack, according to Abnormal AI. Vendor email compromise risks ...

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths

Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the ...

Multiple High-Risk Vulnerabilities in DataEase (CVE-2025-49001/CVE-2025-49002/CVE-2025-48999)

Overview Recently, NSFOCUS CERT has detected that DataEase has issued a security bulletin to fix multiple high-risk vulnerabilities in DataEase (CVE-2025-49001/CVE-2025-49002/CVE-2025-48999). Combined use can achieve unauthorized code execution. ...

Proactive Measures for NHI Threat Detection

What is the Critical Core of NHI Management? Non-Human Identities (NHIs), the machine identities used in cybersecurity, play an essential role in maintaining an organization’s security status. Created by combining a “Secret” (an encrypted ...

Stay Reassured with Enhanced NHI Safety

Can Enhanced NHI Safety Bring You Peace of Mind? The management of Non-Human Identities (NHIs) and Secrets has become increasingly crucial. With all the buzz around the subject, does the thought of enhanced NHI safety reassure you? Although ...

Confidence in Handling NHIs Effectively

What if there was a way to drastically reduce the security risks in your cloud environment? Imagine having the ability to identify and mitigate any risk proactively, without any hassles. It turns out that method exists, and it’s called ...

OffensiveCon25 – Skin In The Game: Survival Of GPU IOMMU Irregular Damage

Authors/Presenters: Fish and Ling Hanqin Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at ...

From Quarterbacks to CxOs: Why We All Need a Coach

At one time, having a personal coach was just for top-tier athletes, but no longer. Whether you prefer the term "mentor" or "life coach," there’s growth potential for us all to consider. The post From Quarterbacks to CxOs: Why We All Need a ...

Week in review: Google fixes exploited Chrome zero-day, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: June 2025 Patch Tuesday forecast: Second time is the charm? Microsoft has been busy releasing more out-of-band (OOB) patches than usual ...

From StackStorm to DeepTempo

And what does it tell us about Cybersecurity? As the founding CEO of StackStorm and now DeepTempo, I’ve seen how the needs of CISOs and SOCs have changed over the last 10+ years. New challenges and a better color scheme! When we started ...

Getting Started with SAST: Detecting Vulnerabilities Early with GitHub Actions

The First Step to Integrating Security into CIContinue reading on Medium »