Application Security News and Articles


Freelance Software Developers in North Korean Malware Crosshairs

ESET says hundreds of freelance software developers have fallen victim to North Korean hackers posing as recruiters. The post Freelance Software Developers in North Korean Malware Crosshairs appeared first on SecurityWeek.

Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand

Apple says it can no longer offer end-to-end encrypted cloud backups in the UK and insists it will never build a backdoor or master key. The post Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand appeared first on ...

Detecting noise in canvas fingerprinting

In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In this post we'll go deeper on how fraudsters can forge or create fake canvas fingerprints to stay under the radar for ...

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question of how can we equip them with a desired cryptographic functionality (e.g, ...

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Cisco Talos observed Chinese hackers pivoting from a compromised device operated by one telecom to target a device in another telecom. The post Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics appeared first on SecurityWeek.

In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked

Noteworthy stories that might have slipped under the radar: Black Basta ransomware chat logs leaked, SEC launches new cyber unit, DOGE website hacked. The post In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked appeared ...

Vulnerabilities in MongoDB Library Allow RCE on Node.js Servers

OPSWAT details two critical vulnerabilities in the Mongoose ODM library for MongoDB leading to remote code execution on the Node.js server. The post Vulnerabilities in MongoDB Library Allow RCE on Node.js Servers appeared first on SecurityWeek.

How China Pinned University Cyberattacks on NSA Hackers

A researcher dives into Chinese reports attributing cyberattacks on Northwestern Polytechnical University to the NSA’s TAO division. The post How China Pinned University Cyberattacks on NSA Hackers appeared first on SecurityWeek.

How DDoS Attacks Work and How You Can Protect Your Business From Them

Learn how DDoS attacks are executed, their impact, and effective strategies for detection and prevention to protect your network and applications. The post How DDoS Attacks Work and How You Can Protect Your Business From Them appeared first on ...

Why Internal Audit Services Are Key to Risk Management in Today’s Business Landscape

Nowadays, organizations face a multitude of risks ranging from financial fraud and cyber threats to regulatory non-compliance and operational inefficiencies. Managing these risks effectively is critical to ensuring business continuity, regulatory ...

CISA Warns of Attacks Exploiting Craft CMS Vulnerability

CISA has added a Craft CMS flaw tracked as CVE-2025-23209 to its Known Exploited Vulnerabilities (KEV) catalog. The post CISA Warns of Attacks Exploiting Craft CMS Vulnerability appeared first on SecurityWeek.

Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls

Palo Alto Networks is warning customers that a second vulnerability patched in February is being exploited in attacks. The post Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls appeared first on SecurityWeek.

What Is EDR? Endpoint Detection and Response

In today’s interconnected world, cybersecurity threats are more sophisticated and pervasive than ever. Traditional security solutions, like antivirus software, often fall short against advanced persistent threats (APTs), zero-day exploits, and ...

Application Security Testing for Legacy Applications: Challenges and Solutions

Explore challenges in securing legacy applications and discover modern solutions like application security tools, and best practices.Continue reading on HCL AppScan »

Is Vibe Coding The Future of Software Development

Digital Technology is evolving faster than ever, and the way we interact with it is transforming dramatically. With the rise of AI-driven development, no-code/low-code platforms,...Read More The post Is Vibe Coding The Future of Software ...

Google Cloud’s Multi-Factor Authentication Mandate: Setting a Standard or Creating an Illusion of Security?

Google Cloud recently announced that it will require all users to adopt multi-factor authentication (MFA) by the end of 2025, joining other major cloud providers like Amazon Web Services (AWS) and Microsoft Azure in mandating this critical ...

OpenText unveils AI-powered threat detection and response capabilities

OpenText announced OpenText Core Threat Detection and Response, a new AI-powered cybersecurity solution for threat detection to be generally available with Cloud Editions 25.2. OpenText has expanded its Cybersecurity portfolio in recent years, ...

Versa Sovereign SASE enables organizations to create self-protecting networks

Versa releases Versa Sovereign SASE, allowing enterprises, governments, and service providers to deploy customized networking and security services directly from their own infrastructure in a “do-it-yourself” model. This approach addresses ...

How CTEM Enhances Threat Prioritization in Complex Networks

Modern enterprise networks are more complex than ever, with sprawling cloud environments, remote workforces, third-party integrations, and a constant influx of new vulnerabilities. Security teams are bombarded with thousands of... The post How ...

Symbiotic Security improves software vulnerability detection in the coding process

Symbiotic Security announced updates to its application and integrated development environment (IDE) extension, further streamlining security for developers by improving usability, accessibility, and real-time security insights. The demand for ...