Application Security News and Articles


Chinese Hacking Group MirrorFace Targeting Europe

Chinese hacking group MirrorFace has targeted a Central European diplomatic institute with the Anel backdoor and AsyncRAT. The post Chinese Hacking Group MirrorFace Targeting Europe appeared first on SecurityWeek.

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats

Austin, TX, United States, 19th March 2025, CyberNewsWire The post SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats appeared first on Security Boulevard.

Scareware Combined With Phishing in Attacks Targeting macOS Users

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users. The post Scareware Combined With Phishing in Attacks Targeting macOS Users appeared first on SecurityWeek.

Advanced Cybersecurity for the Modern Enterprise

Today’s enterprises face an unprecedented cybersecurity challenge. The digital transformation that drives business innovation also exponentially expands the attack surface. Sophisticated threat actors deploy advanced techniques including ...

Exploring Insider Threats with Cyber Sisters

I had the honour of being invited as the first guest on a new podcast hosted by the wonderful Lisa Forte, and Sarah Armstrong Smith where we got to sit down and talk about insider threats. Well, more specifically, around the story where a fake ...

Microsoft Warns of New StilachiRAT Malware

Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. The post Microsoft Warns of New StilachiRAT Malware appeared first on SecurityWeek.

Cloudforce One threat events platform provides a real-time view of threat activity

Cloudflare launched the Cloudforce One threat events platform to provide real-time intelligence on cyberattacks occurring across the Internet. Based on telemetry from Cloudflare’s massive global network, Cloudforce One’s threat events ...

Cytex AICenturion protects against data exfiltration

Cytex launched AICenturion, a LLM Firewall with Data Loss Prevention (DLP) capabilities. GenAI’s risks intensify as LLMs prevent enterprises from directly controlling their processes and data handling. AICenturion provides the trust, risk ...

Data Leaks and AI Agents: Why Your APIs Could Be Exposing Sensitive Information

Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to experiment with it, using tools like chatbots. Others, however, have integrated agentic AI directly into their business procedures and ...

TXOne Networks Stellar 3.2 helps organizations make informed security choices

TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection and response in operational technology (OT) environments. Stellar simplifies the journey ...

Keysight AI Insight Brokers accelerates threat detection and response

Keysight Technologies announces the expansion of its Keysight Vision Network Packet Brokers (NPBs), with the introduction of AI Insight Brokers. These enhanced NPBs are designed to improve the performance of AI-driven cybersecurity operations ...

Outseer introduces Behavioral Biometrics capability

Outseer announced its platform-native Behavioral Biometrics capability. The addition of platformized Behavioral Biometrics introduces another layer of defense that continuously analyzes user interactions to detect anomalies in real time. Building ...

Orion Security emerges from stealth to combat insider threats with AI

Orion Security announced a $6 million Seed funding round led by Pico Partners and FXP with participation from Underscore VC and cybersecurity leaders including the founders of Perimeter 81 and the CISO of Elastic. Founded by CEO Nitay Milner, ...

Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)

Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust and automatic file ...

Moving beyond checkbox security for true resilience

In this Help Net Security interview, William Booth, director, ATT&CK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance with proactive risk management, prioritize spending based on threat-informed assessments, and ...

Dependency-Check: Open-source Software Composition Analysis (SCA) tool

Dependency-Check is an open-source Software Composition Analysis (SCA) tool to identify publicly disclosed vulnerabilities within a project’s dependencies. The tool analyzes dependencies for Common Platform Enumeration (CPE) identifiers. ...

Knocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control Technology

Sydney, Australia, 19th March 2025, CyberNewsWire The post Knocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control Technology appeared first on Security Boulevard.

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As of February 21, 2025, Apple ...

My Take: Here’s why Google’s $32B Wiz grab is the latest Big Tech leap sure to further erode privacy

We’ve seen this movie before. Alphabet, Google’s parent company’s, $32 billion bid for Wiz isn’t just about security and privacy. It’s the latest round in Big Tech’s long-running game of business leapfrog—where each giant keeps ...

How do I mitigate risks associated with NHIs in serverless architectures?

Are you aware of the potential risks Non-Human Identities (NHIs) pose in a serverless environment? Companies are increasingly leveraging the scalability and operational efficiency of serverless architectures. Yet, this innovation also introduces ...