Application Security News and Articles


Why AI deployment requires a new level of governance

In this Help Net Security video, Lee Waskevich, VP of Security at ePlus, discusses how AI deployment demands enhanced governance and stricter controls, particularly in managing data. The recent ePlus AI Readiness survey revealed that the top data ...

Cybersecurity Weekly Update – 24 February 2025

Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Home Office Contractor's Data Collection Sparks Privacy Concerns The Home Office faces scrutiny after ...

Step-by-Step Guide to DevSecOps CI/CD Pipeline with Jenkins: Part 9 — Python Security Scanning…

Leverage Bandit to identify security flaws in Python code as part of your DevSecOps pipeline.Continue reading on DevOps.dev »

Step-by-Step Guide to DevSecOps CI/CD Pipeline with Jenkins: Part 9 — Python Security Scanning…

Leverage Bandit to identify security flaws in Python code as part of your DevSecOps pipeline.Continue reading on Medium »

DEF CON 32 – Efficient Bug Bounty Automation Techniques

Author/Presenter: Gunnar Andrews Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094) The suspected Chinese state-sponsored hackers who breached ...

Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants

The post Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants appeared first on Feroot Security. The post Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants appeared ...

North Korea’s Lazarus Group Hacks Bybit, Steals $1.5 Billion in Crypto

North Korea's notorious Lazarus Group reportedly stole $1.5 billion in cryptocurrency from the Bybit exchange in what is being called the largest hack in the controversial market's history. It came the same day Coinbase executives said the SEC ...

DEF CON 32 – Decoding Galah, An LLM Powered Web Honeypot

Authors/Presenters: Adel Karimi Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange

Over 400,000 ETH and stETH worth more than $1.5 billion were stolen from the Bybit cryptocurrency exchange. The post Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange appeared first on SecurityWeek.

ADR Report | Application Detection and Response Trends | Contrast Labs

In a startling finding, Contrast Security Application Detection and Response stopped tens of thousands of attacks that made it past perimeter defenses on a single application in mid-January 2025.  The post ADR Report | Application Detection and ...

Feel Relieved with Effective Secrets Sprawl Control

Are You Aware of the Risks Associated with Secrets Sprawl? You understand the inherent risks associated with secrets sprawl. You have likely dealt with serious repercussions due to lack of visibility and poor secrets lifecycle management, ...

Stay Calm: Securing Your Enterprise Against Leaks

Why Is Protecting Your Enterprise From Data Leaks So Crucial? Where data is the lifeblood of organizations and data breaches are becoming more common, can we truly afford to be complacent about enterprise security? High-profile breaches reveal ...

Achieving Satisfaction in Cloud Security Investments

Is Your Cloud Security Investment Paying Off? The role of cloud security becomes paramount. At the heart of this security conundrum is an often-overlooked element – Non-Human Identities (NHIs). It is fascinating to observe how the management of ...

DEF CON 32 – National Labs Use Of XR

Authors/Presenters: Martin Pratt Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

New Guidelines: Cybersecurity Resilience in the Healthcare Industry

Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human Services tightening the controls and ...

Cases of China-Backed Spy Groups Using Ransomware Come to Light

Cyberattacks detected by Trend Micro and Orange Cyberdefense find hackers using malware linked to China-backed groups and ransomware, adding more evidence that nation-state cyberespionage groups are also now using ransomware and further blurring ...

Security and privacy concerns challenge public sector’s efforts to modernize

For most public sector organizations, digital transformation is a work in progress, with the complexity of integrating new systems and privacy and security concerns remaining key barriers, according to a report by SolarWinds. Only 6% of ...

DEF CON 32 – Incubated ML Exploits: Backdooring ML Pipelines With Input Handling Bugs

Authors/Presenters: Suha Hussain Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Rust rising: Navigating the ecosystem and adoption challenges

Rust continues to gain traction as a powerful programming language, balancing high performance with memory safety. The post Rust rising: Navigating the ecosystem and adoption challenges appeared first on Security Boulevard.