Application Security News and Articles


Connected cars drive into a cybersecurity crisis

Technology has entered all areas of life, and our cars are no exception. They have become computers on wheels, equipped with sensors, software, and connectivity that provide safety and comfort. However, like all technological innovations, this ...

Benefits from privacy investment are greater than the cost

Cisco released its 2025 Data Privacy Benchmark Study. The report looks at global trends in data privacy and how they affect businesses. The study gathered responses from 2,600 privacy and security experts in 12 countries. It highlights the need ...

Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing

Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing The post Q1 Goals to Gaps in Security: The Rise of HR-Themed Phishing appeared first on Security Boulevard.

Inside the AI-driven threat landscape

In this Help Net Security video, Nick Barter, Chief Strategy Officer at Nothreat, discusses how AI is no longer just a tool for defenders, it’s now a powerful weapon in the hands of attackers. With the adoption of generative AI, cyber threats ...

New infosec products of the week: April 4, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1touch.io, Bitsight, Bluefin, CyberQP, and Exabeam. Exabeam Nova accelerates threat detection and response By correlating multiple detections within a ...

The Fast Flux DNS Threat: A Call to Action Against a Geopolitical and Hacktivist Nightmare

Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, ...

5 Reasons to Secure Firmware in Financial Services Organizations

The post 5 Reasons to Secure Firmware in Financial Services Organizations appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post 5 Reasons to Secure Firmware in Financial Services Organizations appeared first ...

Get Excited About Innovations in IAM

Why Should You Be Excited About Innovations in Identity and Access Management (IAM)? If you’re a Cybersecurity professional or CISO, you understand the value of Non-Human Identities (NHI) and Secrets Management. The burning question, then, is ...

How to Protect Your Spring Sale from Bots

See how a top retailer protected revenue and customer trust during a major spring sale — with faster checkouts and zero downtime. The post How to Protect Your Spring Sale from Bots appeared first on Security Boulevard.

How DataDome Instantly Blocked a 28M-Request Flash DDoS Attack For a $3B E-Commerce Leader

DataDome stopped a 28M-request Flash DDoS in real time—no downtime or disruption for the $3B e-commerce platform under attack. The post How DataDome Instantly Blocked a 28M-Request Flash DDoS Attack For a $3B E-Commerce Leader appeared first on ...

BSidesLV24 – HireGround – You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity

Author/Presenter: Anthony Hendricks Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Protecting Users: Prevent and Stop Cyberthreats Before They Start With Kaseya 365 User

Discover how Kaseya 365 User enhances end-user protection and prevents threats before they cause damage. The post Protecting Users: Prevent and Stop Cyberthreats Before They Start With Kaseya 365 User appeared first on Kaseya. The post Protecting ...

Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)

A suspected Chinese APT group has exploited CVE-2025-22457 – a buffer overflow bug that was previously thought not to be exploitable – to compromise appliances running Ivanti Connect Secure (ICS) 22.7R2.5 or earlier or Pulse Connect ...

Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances 

Ivanti misdiagnoses a remote code execution vulnerability and Mandiant reports that Chinese hackers are launching in-the-wild exploits. The post Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances  appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Rock Identification’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Rock Identification’ appeared first on Security Boulevard.

CISO Transformation: It’s Time for a New Mental Model

CISO mind maps are helpful, but they reinforce a tactical view of security. Learn why modern CISOs need a new mental model focused on strategy, value, and board-level impact. The post CISO Transformation: It’s Time for a New Mental Model first ...

Stopping MFA Fatigue Attacks Before They Start: Securing Your Entry Points

MFA Fatigue Attacks on the Rise Yet another challenge is undermining the effectiveness of MFA: MFA fatigue attacks. In an MFA fatigue attack (sometimes also referred to as an “MFA bombing” or “push bombing” attack), a hacker who already ...

Halo ITSM Vulnerability Exposed Organizations to Remote Hacking

An unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data. The post Halo ITSM Vulnerability Exposed Organizations to Remote Hacking appeared first on SecurityWeek.

Insider Threats Make the Case for Data-centric Security

CISOs appear to be spending more on mitigating insider risk. Reports suggest 16.5% of cybersecurity budgets are now devoted to it, roughly double the figure of a year ago. To understand why, just read the latest threat intelligence from Google, ...

Securing OT Environments with Zero Trust: A Joint Approach by ColorTokens and Claroty

The Growing Cybersecurity Threat in OT Environments As industries undergo digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) is fundamentally reshaping the landscape of critical infrastructure. ...