Application Security News and Articles


Ransomware Group Takes Credit for Lee Enterprises Attack

The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions. The post Ransomware Group Takes Credit for Lee Enterprises Attack appeared first on SecurityWeek.

Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes

The Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago.  The post Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes appeared first on SecurityWeek.

Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face 

Businesses face increasing pressure to maintain compliance across regions, mitigate risks and improve consumer protection and stakeholder trust.  The post Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face  ...

Microsoft Names Suspects in Lawsuit Against AI Hackers

In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam. The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek.

Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats  

  The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and evade detection.  The Veriti Research team analyzed these chat logs, revealing our ...

PowerDMARC Ranks Among G2’s Top 100 Fastest-Growing Software Companies 2025

PowerDMARC secures a spot in G2’s Top 100 Fastest-Growing Software Companies of 2025! Learn how our innovative email authentication solutions drive security, trust, and growth. The post PowerDMARC Ranks Among G2’s Top 100 Fastest-Growing ...

Understanding the AI Act and its compliance challenges

In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity ...

The art of balancing data security with business goals

In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused ...

Infosec products of the month: February 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armor, BigID, Dynatrace, Fortinet, Legit Security, Netwrix, Nymi, Palo Alto Networks, Pangea, Privacera, Qualys, SafeBreach, Satori, Seal ...

How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales

In the fast-paced world of online retail, where customer satisfaction and availability are paramount, a sudden attack by scalping bots can disrupt operations, inflate costs, and damage reputation. A North American Online Retailer faced a ...

Advanced Power Tracking

Product Update: Version 4.8 This update brings key improvements to asset management and power tracking. Highlights include Template Power metrics in bulk actions, simplified rack layouts for easier asset placement, and advanced power sensors for ...

Beyond SMS: HYPR’s Perspective on Gmail’s Shift to QR Code Authentication

SMS-based, two-factor authentication (2FA) has long been a staple security measure for many online services, including Gmail. However, as the tech industry shifts towards more secure authentication methods, it has become evident that SMS codes ...

Cybersecurity Insights with Contrast CISO David Lindner | 02/27/25

Insight #1 - Veracode report: Flaw fix times increase 47% since 2020 Veracode’s 2025 State of Software Security report exposes a troubling trend — flaw fix times have surged 47%, jumping from 171 days in 2020 to 252 days in 2025.  This ...

Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI

How Morpheus revolutionizes security automation with dynamically generated, context-aware workflows. The post Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI appeared first on D3 Security. The post Morpheus: Building ...

Do Powerful Tools Enhance Your Data Security?

How Can Powerful Security Tools Impact Your Data Protection Strategy? Has it ever occurred to you how critical it is to have a robust data protection framework in massive digitalization? The need for advanced cybersecurity measures becomes more ...

Is Your NHI Lifecycle Management Capable?

Is Your Approach to NHI Lifecycle Management Robust Enough? Have you ever wondered about the invisibility of your organizational cyber risk? When did you last evaluate the strength of your Non-Human Identity (NHI) lifecycle management? The ...

Optimistic About Future Cybersecurity Trends?

Can We Be Optimistic About Future Cybersecurity Trends? Driven by the incessant need for safer digital environments where data and machine identities form the core of many organizational operations. A seasoned data management expert and ...

CMMC is Here: Simplifying Compliance with Enclaves 

A joint blog featuring CISO Global’s Compliance Team & PreVeil The long-anticipated CMMC rule (CFR 32) is now live, marking a crucial turning point for defense contractors. The Compliance Team at CISO Global recently passed our CMMC Audit ...

DEF CON 32 – Finding 0days In Vilo Home Routers

Authors/Presenters: Justin Mott & Ava Petersen Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

The Future of Auditing: What to Look for in 2025

The 2025 audit landscape is shaped by new regulations and changes in enforcement of existing regulations. In the United States, both changes to longstanding administrative law and the Public Company Accounting Oversight Board (PCAOB) will shape ...