Application Security News and Articles


Trump Coins Used as Lure in Malware Campaign

Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. The post Trump Coins Used as Lure in Malware Campaign appeared first on SecurityWeek.

Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks

Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities. The post Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Excusing Yourself’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Excusing Yourself’ appeared first on Security Boulevard.

Data-Driven Analysis With a Managed CRQ Platform | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Data-Driven Analysis With a Managed CRQ Platform | Kovrr appeared first on Security Boulevard.

Review: The Cybersecurity Trinity

The Cybersecurity Trinity provides a comprehensive approach to modern cybersecurity by integrating AI, automation, and active cyber defense (ACD) into a unified strategy. Instead of addressing these elements in isolation, the author demonstrates ...

Pondurance Platform 2.0 identifies data breach risks

Pondurance announced a major new version of its cybersecurity platform. Pondurance Platform 2.0 provides the foundation for Pondurance’s risk-based MDR service specifically designed to eliminate breach risks. With this announcement, Pondurance ...

BSides Exeter 2024 – Purple Track – Panel: Mythbusting The Silver Bullet

Authors/Presenters: Panel Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

Cybersecurity Compliance and Regulatory Frameworks: A Comprehensive Guide for Companies

Navigate the complex landscape of cybersecurity compliance with comprehensive guide to regulatory frameworks. Discover how to evaluate which standards apply to your organization, implement effective security controls, and maintain continuous ...

Email Phishing and Online Anonymity: Can You Completely Hide from Attackers on the Darknet?

Explore the challenges of online anonymity and email phishing. Learn how tools like VPNs and Tor enhance privacy but aren’t foolproof. Stay safe and anonymous online. The post Email Phishing and Online Anonymity: Can You Completely Hide from ...

Detectify Alfred helps security teams collect threat intelligence

Detectify announced Alfred, a system that uses AI to completely autonomously source, prioritize, and generate high-fidelity security tests for the CVEs that are most likely to be exploited. This innovation allows Detectify to continuously and ...

Cobalt Strike Abuse Dropped 80% in Two Years

Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors. The post Cobalt Strike Abuse Dropped 80% in Two Years appeared first on SecurityWeek.

Security’s Next Evolution: From Detection Fatigue to True Remediation 

Security’s Next Evolution: From Detection Fatigue to True Remediation  The security industry has mastered detection. It has even gotten pretty good at prioritization, or so vendors like to claim. But let’s be real: Detection without ...

The Buddy System: Why Google is Finally Killing SMS Authentication

Like the Buddy System in The Simpsons, SMS authentication was only foolproof if everything went right. But when both “buddies” could be compromised at the same time, the entire system was doomed to fail. The post The Buddy System: Why Google ...

Microsoft: Massive Malvertising Campaign Infects a Million Devices

A massive malvertising campaign that targeted individuals watching pirated videos on illegal streaming sites redirected them several times before landing them at GitHub repositories that hosted infostealers and other malware, according to ...

Developer Convicted for Hacking Former Employer’s Systems

Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data. The post Developer Convicted for Hacking Former Employer’s Systems appeared first on SecurityWeek.

Google Paid Out $12 Million via Bug Bounty Programs in 2024

In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs. The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek.

Simplifying Compliance and Protecting Data at Garvey School District

How Garvey K-8 School District Partners with ManagedMethods to Keep Data Secure and Students Safe in Google Workspace As a K-8 district, Garvey School District is on a mission. Not only are its 500 staff members responsible for providing a ...

Mass Exploitation of Critical PHP Vulnerability Begins

GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek.

SimSpace Stack Optimizer allows organizations to measure their security technologies

SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure. By leveraging SimSpace’s realistic simulated environments, organizations can perform comprehensive security ...

SEC Compliance Requirements: Why Your Risk Appetite Matters

The SEC is getting serious about cybersecurity. Recent regulations and high-profile cases signal a new era of accountability for publicly listed companies. But how do you prepare? How do you protect your business and stay on the right side of the ...