Application Security News and Articles


Million-dollar Salaries, Board Influence Mark the CISO’s Rise 

Five years post-pandemic, half of CISOs at enterprises with revenue of $20 billion or more now hold EVP- or SVP-level titles. The post Million-dollar Salaries, Board Influence Mark the CISO’s Rise  appeared first on Security Boulevard.

Vulnerability Management: Hidden Costs, Confidence Shortfalls, and Siloed Processes

The post Vulnerability Management: Hidden Costs, Confidence Shortfalls, and Siloed Processes appeared first on AI Security Automation. The post Vulnerability Management: Hidden Costs, Confidence Shortfalls, and Siloed Processes appeared first on ...

The Sequential Kill Chain for AI – FireTail Blog

May 30, 2025 - Timo Rüppell - The Sequential Kill Chain for AI-Powered Attacks Excerpt: We’ve talked before about Mean Time To Attack, or MTTA, which has grown alarmingly short for new vulnerabilities across the cyber landscape. In this blog, ...

BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode

Author/Presenter: Filipi Pires Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Firebase, Google Apps Script Abused in Fresh Phishing Campaigns

Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages. The post Firebase, Google Apps Script Abused in Fresh Phishing Campaigns appeared first on SecurityWeek.

US Sanctions Philippine Company for Supporting Crypto Scams

The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams. The post US Sanctions Philippine Company for Supporting Crypto Scams appeared first on SecurityWeek.

Why AI Hallucinations Are the Biggest Threat to Gen AI’s Adoption in Enterprises

In 2024, enterprise investments in generative AI skyrocketed. Microsoft alone committed over $10 billion to OpenAI, and according to a Gartner report, more than 80%...Read More The post Why AI Hallucinations Are the Biggest Threat to Gen AI’s ...

Cybersecurity Insights with Contrast CISO David Lindner | 05/30/25

Insight No. 1 — Prioritize proof over promises in agentic AI SC World recently noted that there were three points missing from agentic AI conversations at RSAC. I agree. Many new technologies arrive with significant fanfare. Agentic AI is no ...

Cybersecurity Snapshot: New Standard for AI System Security Published, While Study Finds Cyber Teams Boost Value of Business Projects

Check out ETSI’s new global standard for securing AI systems and models. Plus, learn how CISOs and their teams add significant value to orgs’ major initiatives. In addition, discover what webinar attendees told Tenable about their cloud ...

Zscaler Moves to Acquire Red Canary MDR Service

Zscaler this week revealed it is acquiring Red Canary, a provider of a managed detection and response (MDR) service that will be incorporated into the portfolio of offerings delivered via a zero-trust cloud platform for accessing ...

Top Cloud Vulnerabilities in Fintech and How to Fix Them

For financial technology (FinTech) organizations, cloud security is both a top priority and a significant concern, as highlighted by a study conducted by McKinsey and the Institute of International Finance (IIF). FinTech companies increasingly ...

Strategies for Enhancing Your Organization’s Cyber Resilience

Organizations must improve their cyber resilience – not just for the sake of business operations, but to maintain customer confidence.   The post Strategies for Enhancing Your Organization’s Cyber Resilience appeared first on Security Boulevard.

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments

China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C. The post Chinese Hacking Group APT41 Exploits Google ...

Why Take9 Won’t Improve Cybersecurity

There’s a new cybersecurity awareness campaign: Take9. The idea is that people—you, me, everyone—should just pause for nine seconds and think more about the link they are planning to click on, the file they are planning to download, or ...

MITRE Publishes Post-Quantum Cryptography Migration Roadmap

The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation. The post MITRE Publishes Post-Quantum Cryptography Migration Roadmap ...

Moving On Has Never Been So Simple: MSPs & ICES Solutions (Part 3)

Every tech stack has its "we need to talk" moment, and for most MSPs, it comes right after your SEG lets a phish waltz into a client’s inbox like it owns the place. If you’re reading this, chances are you’ve had that moment. Whether it was ...

ConnectWise Discloses Suspected State-Sponsored Hack

The IT software provider says ScreenConnect users were impacted by the attack, which exploited a high-severity ASP.NET vulnerability. The post ConnectWise Discloses Suspected State-Sponsored Hack appeared first on SecurityWeek.

CISA Releases Guidance on SIEM and SOAR Implementation

The guidance outlines the benefits and challenges or SIEM and SOAR platforms, and shares implementation recommendations. The post CISA Releases Guidance on SIEM and SOAR Implementation appeared first on SecurityWeek.

From Swipe to Scare: Data Privacy and Cyber Security Concerns in Dating Apps

Dating apps changed everything; didn’t they? They’ve truly revolutionised how we discover love and make connections. Consider this: over 323 million people worldwide use them—millions swiping, matching, and meeting. But there’s a catch ...

Why privacy in blockchain must start with open source

Traditionally, trust came from centralized institutions. Banks, payment networks, and clearinghouses are closed systems. Users cannot see the inner workings, but they rely on external audits, government regulation, and long histories of ...