Application Security News and Articles


BSidesLV24 – IATC – Difficult Conversations

Author/Presenter: Andrea M. Matwyshyn Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

ADAMnetworks Licensed Technology Partner (LTP) Program

ADAMnetworks Licensed Technology Partner (LTP) Program Empowering MSPs, MSSPs & MDR Providers with Next-Gen Zero Trust Security In today’s threat-filled digital landscape, reactive cybersecurity isn’t enough. Businesses, governments, ...

SAST vs. DAST: Bridging the Gap in Application Security Testing

This article explores the key differences between SAST and DAST, their advantages and limitations, and how organizations can bridge the…Continue reading on Medium »

Snow White — Beware the Bad Apple in the Torrent 

As the new Snow White movie arrives in theaters with lackluster audience attendance (source), the absence of streaming options on platforms like Disney+ has nudged many users to seek pirated versions online.  From our perspective, this kind of ...

The Rise of Mobile Phishing and How to Prevent Mobile Phishing

The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on AI Security Automation. The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on Security Boulevard.

Introducing the Mend.io Value Dashboard: Measure and Showcase Your Security Impact

Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard. The post Introducing the Mend.io Value Dashboard: Measure and Showcase Your Security Impact appeared first on Security Boulevard.

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #330 — AI For Job Hunting

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Russian Ransomware Gang Exploited Windows Zero-Day Before Patch

Exploitation of Windows MMC zero-day is being pinned on a ransomware gang known as EncryptHub (an affiliate of RansomHub) The post Russian Ransomware Gang Exploited Windows Zero-Day Before Patch appeared first on SecurityWeek.

Oracle Breach: The Impact is Bigger Than You Think | Grip

Learn how the Oracle breach amplifies your risk from rogue cloud tenants plus how Grip helps organizations detect exposure and respond fast to mitigate risks. The post Oracle Breach: The Impact is Bigger Than You Think | Grip appeared first on ...

Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

Recently, two critical security flaws were discovered in Kentico Xperience 13, a popular digital experience platform (CMS). Tracked as CVE-2025-2746 and CVE-2025-2747, these vulnerabilities allow unauthenticated attackers to bypass the Staging ...

AMTSO Releases Sandbox Evaluation Framework

AMTSO has developed a Sandbox Evaluation Framework to standardize the testing of malware analysis solutions.  The post AMTSO Releases Sandbox Evaluation Framework appeared first on SecurityWeek.

CoffeeLoader: A Brew of Stealthy Techniques

IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading ...

Enemies with benefits: RansomHub and rival gangs share EDRKillShifter tool

ESET researchers have published an in-depth analysis highlighting significant shifts within the ransomware landscape, spotlighting the rise of RansomHub. This relatively new ransomware-as-a-service operation has quickly come to dominate the ...

China-linked FamousSparrow APT group resurfaces with enhanced capabilities

ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector. While helping the affected entity remediate the compromise, they made an unexpected discovery in the victim’s ...

BSidesLV24 – IATC – Hungry, Hungry Hackers

Authors/Presenters: Sick.Codes, Casey John Ellis Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...

Securing Canada’s Digital Backbone: Navigating API Compliance

Highlights: Understanding Canadian API Standards: Key principles for secure government API development. Critical Importance of API Security: Why robust protection is vital for citizen data. Compliance and Trust: How adherence to standards builds ...

Island Banks $250M Series E for Enterprise Browser

The late-stage startup said the round was led Coatue Management and brings Island’s total external funding to approximately $730 million. The post Island Banks $250M Series E for Enterprise Browser appeared first on SecurityWeek.

Oscilar AI Agent improves risk analysis and fraud prevention

Oscilar launched AI Agent platform, reshaping how organizations manage online risk. Built around a network of specialized AI agents, Oscilar’s platform addresses key challenges in fraud prevention, compliance, credit underwriting, and ...

How AI is Fueling ATOs & Fake Account Creation—And Why Bot Detection Needs to Evolve

AI is now part of the botnet. See how it’s powering ATOs and fake accounts, and why real-time, multi-layered detection is the only way to fight back. The post How AI is Fueling ATOs & Fake Account Creation—And Why Bot Detection Needs to ...

If you think you’re immune to phishing attempts, you’re wrong!

Security consultant Troy Hunt, the creator of the Have I Been Pwned (HIBP) service, has revealed that he got tricked by a clever phishing email, and that the attacker gained access to his Mailchimp account and stole a list of email addresses of ...