Application Security News and Articles


Hottest cybersecurity open-source tools of the month: May 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Vuls: Open-source agentless vulnerability scanner Vuls is an open-source tool that ...

Choosing a secrets manager for multi-cloud: Doppler vs. cloud-native tools

Doppler helps teams manage secrets across clouds with one source of truth. Learn how it simplifies security, scaling, and compliance in multi-cloud environments. The post Choosing a secrets manager for multi-cloud: Doppler vs. cloud-native tools ...

Zscaler to Acquire MDR Specialist Red Canary

Zscaler signals a big push into the security-operations market with the announcement of plans to buy Denver-based Red Canary. The post Zscaler to Acquire MDR Specialist Red Canary appeared first on SecurityWeek.

Understanding the Cookie-Bite MFA Bypass Risk

The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ...

eSkimming Security – Driving Bottom Line Results through Fraud Reduction and Revenue Maximization

by Source Defense Even with the PCI DSS 4.0 deadline now behind us, many organizations are still exposed to costly eSkimming threats and compliance gaps. Source Defense recently hosted a webinar to explore how compliance actually drives better ...

BSidesLV24 – PasswordsCon – Long Live Short Lived Credentials – Auto-Rotating Secrets At Scale

Author/Presenter: Dwayne McDaniel Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack

Sina Gholinejad pleaded guilty to computer-fraud and wire-fraud-conspiracy charges linked to the Robbinhood ransomware hit on Baltimore. The post Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Drafting’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Drafting’ appeared first on Security Boulevard.

RSA and Bitcoin at BIG Risk from Quantum Compute

PQC PDQ: Researchers find we’ll need 20 times fewer qubits to break conventional encryption than previously believed. The post RSA and Bitcoin at BIG Risk from Quantum Compute appeared first on Security Boulevard.

Seceon Wins “MSP Platform Provider Vendor of the Year” at Technology Reseller Awards 2025

At Seceon, we’re honored to announce that we have been named the “MSP Platform Provider Vendor of the Year” at the Technology Reseller Awards 2025. This recognition is a meaningful milestone that celebrates our ongoing commitment to ...

SBOM management and generation: How Sonatype leads in software supply chain visibility

As software supply chain threats become more complex, organizations need more than just vulnerability scanning — they need complete visibility into the components that make up their applications. The post SBOM management and generation: How ...

Protecting Biomedical Devices in the Large Healthcare Enterprise

Discover how Claroty and ColorTokens secure IoMT and prevent lateral movement in healthcare networks with agentless microsegmentation and visibility. The post Protecting Biomedical Devices in the Large Healthcare Enterprise appeared first on ...

DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a managed service provider. The post DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities appeared first on SecurityWeek.

Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas 

An alert from CISA, FBI, EPA and DOE came after CISA observed attacks by “unsophisticated” cyber actors leveraging “basic and elementary intrusion techniques” against ICS/SCADA systems.  The post Unsophisticated Actors, Poor Hygiene ...

BSidesLV24 – PasswordsCon – Combating Phone Spoofing With STIR/SHAKEN

Author/Presenter: Per Thorsheim Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Russian Government Hackers Caught Buying Passwords from Cybercriminals

Microsoft flags a new Kremlin hacking team buying stolen usernames and passwords from infostealer markets for use in cyberespionage attacks.  The post Russian Government Hackers Caught Buying Passwords from Cybercriminals appeared first on ...

Ongoing Campaign Uses 60 NPM Packages to Steal Data

Security firm Socket warns flags a campaign targeting NPM users with tens of malicious packages that can hijack system information. The post Ongoing Campaign Uses 60 NPM Packages to Steal Data appeared first on SecurityWeek.

DefectDojo’s SOC capabilities simplify cybersecurity operations

DefectDojo announced next-gen Security Operations Center (SOC) capabilities for DefectDojo Pro, which provides both SOC and AppSec professionals a unified platform for noise reduction and prioritization of SOC alerts and AppSec findings. As both ...

Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group

The Dutch intelligence and security services have identified a new Russia-affiliated threat group that has been breaching government organizations and commercial entities in Europe and North America, and they dubbed it Laundry Bear. ...

Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack

The agencies said that the group, which they called Laundry Bear, is actively trying to steal sensitive data from EU and NATO countries and is “extremely likely Russian state supported.” The post Dutch Intelligence Agencies Say Russian ...