Application Security News and Articles


Privacy Roundup: Week 13 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 23 MAR 2025 - 29 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

Online Scams in the Age of AI

The question is no longer whether AI-driven scams will target your business, but how prepared you are to counter them. The post Online Scams in the Age of AI appeared first on Security Boulevard.

Analyzing New HijackLoader Evasion Tactics

IntroductionHijackLoader (also known as IDAT Loader and GHOSTPULSE) is a malware loader initially discovered in 2023. The loader is not only capable of delivering second-stage payloads, but also offers a variety of modules to expand the ...

Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory

Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks. The post Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory appeared first on SecurityWeek.

Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program

A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost. The post Zero to Hero – A “Measured” Approach to Building a World-Class ...

The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat

Secrets aren't just in code. GitGuardian’s 2025 report shows major leaks in collaboration tools like Slack, Jira, and Confluence. Here’s what security teams need to know. The post The Hidden Breach: Secrets Leaked Outside the Codebase Pose a ...

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices

CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by ...

Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure ...

Hacker Leaks Samsung Customer Data

Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials. The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek.

EU invests €1.3 billion in AI and cybersecurity

The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU’s future and technological sovereignty. DIGITAL is an EU funding ...

Unsolved Challenge: Why API Access Control Vulnerabilities Remain a Major Security Risk

Despite advancements in API security, access control vulnerabilities, such as broken object-level authentication (BOLA) and broken function-level authentication (BFLA), remain almost impossible to detect.  This blog will explore why these ...

The PIN is Mightier Than the Face

People pick weak passwords or reuse them over devices, tokens are lost, compromised or bypassed, and biometrics can be forced or spoofed. The post The PIN is Mightier Than the Face appeared first on Security Boulevard.

Part of EU’s New €1.3 Billion Investment Going to Cybersecurity

The European Commission plans on investing €1.3 billion ($1.4 billion) in cybersecurity, artificial intelligence and digital skills.  The post Part of EU’s New €1.3 Billion Investment Going to Cybersecurity appeared first on SecurityWeek.

How to Make the Most of Your AirSwap sAST Rewards

Simple Tips to Increase Your AirSwap sAST Staking RewardsContinue reading on Medium »

‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft

The newly identified Android banking trojan Crocodilus takes over devices, enabling overlay attacks, remote control, and keylogging. The post ‘Crocodilus’ Android Banking Trojan Allows Device Takeover, Data Theft appeared first on ...

15 Reasons to Trust Seceon aiSIEM Solution: Transforming Enterprise Cybersecurity

In today’s complex cybersecurity landscape, organizations need robust security information and event management (SIEM) solutions that can effectively detect and respond to threats. Seceon’s aiSIEM solution stands out as a powerful option in ...

CISA Analyzes Malware Used in Ivanti Zero-Day Attacks

CISA has published its analysis of Resurge, a SpawnChimera malware variant used in attacks targeting a recent Ivanti Connect Secure zero-day. The post CISA Analyzes Malware Used in Ivanti Zero-Day Attacks appeared first on SecurityWeek.

170,000 Impacted by Data Breach at Chord Specialty Dental Partners

An email security incident at Chord Specialty Dental Partners, a US dental service organization, has impacted more than 170,000 people.  The post 170,000 Impacted by Data Breach at Chord Specialty Dental Partners appeared first on SecurityWeek.

Industry Moves for the week of March 31, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of March 31, 2025. Stay updated with the latest industry trends and shifts.

Windows 11 quick machine recovery: Restoring devices with boot issues

Microsoft has rolled out quick machine recovery, a new Windows feature aimed at preventing prolonged widespread outages like the one caused by a faulty CrowdStrike update in July 2024. The goal of the feature is to allow IT administrators to ...