Application Security News and Articles


CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine

Russian military intelligence hackers intensify targeting of Western logistics and technology companies moving supplies into Ukraine.  The post CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine appeared first on SecurityWeek.

Securing Open Banking: How Fintechs Can Defend Against Automated Fraud & API Abuse

Open Banking is accelerating innovation, and fraud—with API abuse, credential stuffing, and fake account creation now among the top threats fintechs must defend against in real time. The post Securing Open Banking: How Fintechs Can Defend ...

SaaS Security Made Simple: Build Your Case, Choose Your Vendor, and Protect Your Data

Cut through SaaS security complexity. Discover how to protect data, avoid costly missteps, and evaluate the right tools—plus get a free ebook with practical templates and checklists. The post SaaS Security Made Simple: Build Your Case, Choose ...

BSidesLV24 – PasswordsCon – Detecting Credential Abuse

Authors/Presenters: Troy Defty, Kathy Zhu Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation

Redmond’s threat hunters found 394,000 Windows systems talking to Lumma controllers, a victim pool included global manufacturers.  The post Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation appeared first on ...

What Kind of Identity Should Your AI Agent Have?

7 min readAI agents don’t neatly fit into your IAM chart. They switch roles, borrow authority, and rewrite what identity means at runtime. Here's what that means for you. The post What Kind of Identity Should Your AI Agent Have? appeared first ...

Lumma Stealer Malware-as-a-Service operation disrupted

A coordinated action by US, European and Japanese authorities and tech companies like Microsoft and Cloudflare has disrupted the infrastructure behind Lumma Stealer, the most significant infostealer threat at the moment. What is Lumma Stealer? ...

How 2024 will impact quality engineering teams

As we step into the new year, it's time to explore the exciting trends that will shape the world of Quality Engineering in 2024. Here’s what we’ve been seeing in our work with Quality Engineering teams around the globe. The post How 2024 will ...

The Role of AI in FinTech: Innovation, Transformation, and the Ethics You Can’t Ignore

The financial services industry is in the midst of a thrilling transformation, and Artificial Intelligence (AI) is the spark igniting it all! Picture this: in...Read More The post The Role of AI in FinTech: Innovation, Transformation, and the ...

Survey: Too Much Time Being Spent on Managing Cybersecurity Tools

A survey of 2,058 security leaders finds nearly half of respondents (46%) are spending more time maintaining tools than they do defending their organization from actual cyberattacks. The post Survey: Too Much Time Being Spent on Managing ...

LLM03: Supply Chain – FireTail Blog

May 21, 2025 - Lina Romero - LLM03: Supply Chain 20/5/2025 Excerpt The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each ...

Breach Readiness in a World That’s Always Connected

Rajesh Khazanchi, CEO & Co-founder of ColorTokens, explains how microsegmentation keeps critical services running in hyper-connected world, delivering true breach readiness and business resilience. The post Breach Readiness in a World ...

Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535. The post Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway appeared first on SecurityWeek.

BSidesLV24 – GroundFloor – Insert Coin: Hacking Arcades For Fun

Authors/Presenters: Ignacio Navarro Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025

MEDIA ADVISORY Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025 Gerry Gebel to join fellow AuthZEN co-chairs to discuss next-gen authorization interoperability and open standards BOULDER, Colo., ...

Email Spoofing Security

Email spoofing security is an imperative addition to your email’s security posture, here’s why. Email spoofing is a form of internet fraud. Leverage email authentication tools to enhance your domain’s email spoofing security. The post Email ...

Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December. The post Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users appeared first on SecurityWeek.

Data-stealing VS Code extensions removed from official Marketplace

Developers who specialize in writing smart (primarily Ethereum) contracts using the Solidity programming language have been targeted via malicious VS Code extensions that install malware that steals cryptocurrency wallet credentials. “Based ...

Cloud Data Protection: How DSPM Helps You Discover, Classify and Secure All Your Data Assets

In this fourth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM ...