Application Security News and Articles


A Pragmatic Approach to Effective Security

Cybersecurity is constantly evolving, and staying ahead of threats requires more than just tools—it demands strategy, leadership, and expertise. The unfortunate reality is that the threat landscape affects all companies regardless of industry ...

Ex-Michigan, Ravens Football Coach Charged with Hacking Athlete Accounts

Matthew Weiss, former football coach for the University of Michigan and the Baltimore Ravens, for almost 10 years accessed the social media and other online accounts of thousands of student athletes and downloaded personal information and ...

Securing Your Supply Chain from Phishing Attacks

In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the need to level up domain security. The post Securing Your Supply Chain from Phishing Attacks appeared first on Security ...

53% of security teams lack continuous and up-to-date visibility

Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock Security. The majority of organizations struggle to track sensitive ...

In Other News: Critical Chrome Bug, Capital One Hacker Resententencing, Story of Expat Flaw

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw.  The post In Other News: Critical Chrome Bug, Capital One Hacker ...

DEF CON 32 – Recon Village – GeoINT Mastery: A Pixel Is Worth A Thousand Words

Speaker: Mishaal Khan Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Ransomware Group Claims Attack on Virginia Attorney General’s Office

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office. The post Ransomware Group Claims Attack on Virginia Attorney General’s Office appeared first on SecurityWeek.

A Peek on Cloud Security: JSSI 2025

At JSSI 2025, French IT security experts discussed the cloud's impact on security. Presentations covered strategy and technical analysis. GitGuardian’s researchers shared insights on detecting secrets in the cloud and responsibly disclosing ...

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Check out key findings and insights from the “Tenable Cloud AI Risk Report 2025.” Plus, get fresh guidance on how to transition to quantum-resistant cryptography. In addition, find out how AI is radically transforming cyber crime. And get the ...

Malicious ads target Semrush users to steal Google account credentials

Cyber crooks are exploiting users’ interest in Semrush, a popular SEO, advertising, and market research SaaS platform, to steal their Google account credentials. The fraudulent campaign Malwarebytes researchers have spotted a campaign ...

New Jailbreak Technique Uses Fictional World to Manipulate AI

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls. The post New Jailbreak Technique Uses Fictional World to Manipulate AI appeared first on SecurityWeek.

Unlocking the Power of BIN Monitoring for Compromised Cards

63% of US cardholders have fallen victim to fraud. One critical area of risk is the exposure of full payment card numbers on the dark web. The post Unlocking the Power of BIN Monitoring for Compromised Cards appeared first on Security Boulevard.

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign. The post Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley appeared first on SecurityWeek.

NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)

A vulnerability (CVE-2024-48248) in NAKIVO Backup and Replication, a backup, ransomware protection and disaster recovery solution designed for organizations of all sizes and managed service providers (MSPs), is being actively exploited. The US ...

Industry Reactions to Google Buying Wiz: Feedback Friday

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash. The post Industry Reactions to Google Buying Wiz: Feedback Friday appeared first on SecurityWeek.

Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover. The post Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover appeared first on SecurityWeek.

Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit

Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame. The post Fifth Circuit Strikes Down “Geofence” Warrants ...

Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes’ Intimate Photos

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos. The post Former NFL, Michigan Assistant Coach Matt Weiss Charged With ...

How to Protect Your Business from E-commerce Fraud in 2025

Protect your online business with proven e-commerce fraud prevention strategies. Learn key security measures and tools to protect your revenue in 2025. The post How to Protect Your Business from E-commerce Fraud in 2025 appeared first on Security ...

NSFOCUS Unveils AI-Driven Security Solutions at HKIB 2025 Cybersecurity Solutions Day

Hong Kong, March 21, 2025 – The Hong Kong Institute of Bankers (HKIB) 2025 Cybersecurity Solutions Day kicked off on March 20, drawing over 600 executives and experts from financial institutions and cybersecurity domains to explore strategies ...