Application Security News and Articles


CISA Analyzes Malware From Ivanti EPMM Intrusions

Hackers chained two Ivanti EPMM vulnerabilities to collect system information, dump credentials, and execute malware. The post CISA Analyzes Malware From Ivanti EPMM Intrusions appeared first on SecurityWeek.

ChatGPT Tricked Into Solving CAPTCHAs

The AI agent was able to solve different types of CAPTCHAs and adjusted its cursor movements to better mimic human behavior. The post ChatGPT Tricked Into Solving CAPTCHAs appeared first on SecurityWeek.

Surveying the Global Spyware Market

The Atlantic Council has published its second annual report: “Mythical Beasts: Diving into the depths of the global spyware market.” Too much good detail to summarize, but here are two items: First, the authors found that the number of ...

Netskope Raises Over $908 Million in IPO

Netskope has debuted on Nasdaq and its shares soared more than 18%, bringing the company’s value to $8.6 billion.  The post Netskope Raises Over $908 Million in IPO appeared first on SecurityWeek.

OWASP Top Ten 2021 explained with simple Java examples and SAST insights

In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java analyzer warnings. So, if you want to…Continue reading on Medium »

Two Scattered Spider Suspects Arrested in UK; One Charged in US

Thalha Jubair and Owen Flowers were charged in the UK and the US with hacking critical infrastructure organizations. The post Two Scattered Spider Suspects Arrested in UK; One Charged in US appeared first on SecurityWeek.

Trojan Horse Virus: Understanding, Detecting, and Defending with Seceon

The Trojan Horse Virus is one of the most deceptive forms of malware. Just like the Greek myth of soldiers hiding in a wooden horse to invade Troy, Trojan malware disguises itself as harmless files or programs to infiltrate systems. Once inside, ...

New Wave of Self-Replicating NPM Malware Exposes Critical Gaps in Software Supply Chain Security

The Shai-Hulud NPM worm highlights rising open-source supply chain threats. Secure builds with SBOMs, MFA, signed packages, and zero-trust defenses. The post New Wave of Self-Replicating NPM Malware Exposes Critical Gaps in Software Supply Chain ...

New Tigera solution protects AI workloads from data ingestion to deployment

Tigera announced a new solution to secure AI workloads running in Kubernetes clusters. Due to the resource-intensive and bursty nature of AI workloads, Kubernetes has become the de facto orchestrator for deploying them. However AI workloads ...

Astra API Security Platform secures undocumented and vulnerable APIs

Astra Security has launched its API Security Platform, designed to identify undocumented, zombie, and shadow APIs that threaten infrastructure and expose sensitive PII. Instead of relying on reactive, siloed detection tools, Astra’s platform ...

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Novakon HMIs are affected by remote code execution and information exposure vulnerabilities.  The post Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking appeared first on SecurityWeek.

Cybersecurity Consulting

As businesses expand digitally, their attack surface grows exponentially. Cyber threats today are no longer limited to viruses or spam emails—they include ransomware, insider threats, phishing, supply chain attacks, zero-day exploits, and ...

Recap of Our “Passkeys Pwned” Talk at DEF CON

What the ”Passkeys Pwned” talk is and isn’t about, and what it reveals about the importance of correct implementation of the standard The Passkeys Pwned Talk Summary As outlined in the DEF CON abstract below, the Passkeys Pwned attack ...

What is CIAM? A Comprehensive Definition of Customer Identity Management

Unlock the comprehensive definition of CIAM (Customer Identity and Access Management). Learn about its benefits, key features, and how it differs from IAM. Perfect for Devs! The post What is CIAM? A Comprehensive Definition of Customer Identity ...

Enterprise Cybersecurity Strategy: How to Secure Large Scale Businesses

Enterprise cybersecurity involves a wide-ranging method aimed at protecting company networks, data, apps, and cloud platforms from a rising number of cyber threats. It focuses on lowering weaknesses, strengthening security measures, and keeping ...

LLMs can boost cybersecurity decisions, but not for everyone

LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making ...

Researchers believe Gamaredon and Turla threat groups are collaborating

ESET Research has discovered evidence of collaboration between the Gamaredon and Turla threat groups. Both groups are linked to Russia’s primary intelligence agency, the FSB, and were found working in tandem to target high-profile organizations ...

Shifting supply chains and rules test CPS security strategies

Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage ...

The real-world effects of EU’s DORA regulation on global businesses

In this Help Net Security video, Matt Cooper, Director of Governance, Risk, and Compliance at Vanta, discusses the EU’s Digital Operational Resilience Act (DORA) and its effects six months after it went into effect. DORA is the first EU-wide ...

The unseen side of malware and how to find it

Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of the story. Hidden malware variants are quietly slipping past ...