Application Security News and Articles


USENIX 2025: PEPR ’25 – Remediating Systemic Privacy Incidents

Creator, Author and Presenter: Sam Havron, Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX ’25 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 ...

Ransom Tales: Volume IV – Emulating Rhysida, Charon and Dire Wolf Ransomware

AttackIQ presents the fourth volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and Procedures (TTPs) exhibited by sophisticated and prominent ransomware families with the objective of empowering defenders to ...

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Austin / TX, United States, 25th September 2025, CyberNewsWire The post Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk appeared first on Security Boulevard.

European Windows 10 users get an additional year of free security updates

Windows 10 users in the European Economic Area (EEA) will be able to receive extended security updates until October 14, 2026, without having to pay for them or to back up their settings, apps, or credentials to the Microsoft cloud. Microsoft ...

The Supply Chain Breach Effects Are Not Affordable

Beginning September 19, 2025, RTX subsidiary Collins Aerospace’s passenger processing platform experienced a systems disruption affecting automated check-in, bag drop, and boarding workflows at several major European airports. For thousands of ...

Salesforce AI Hack Enabled CRM Data Theft

Prompt injection has been leveraged alongside an expired domain to steal Salesforce data in an attack named ForcedLeak. The post Salesforce AI Hack Enabled CRM Data Theft appeared first on SecurityWeek.

IBM QRadar SIEM and Contrast ADR Integration | Actionable Application Security Intelligence | Contrast Security

Is your IBM QRadar instance overwhelmed by web application firewall (WAF) alerts, or worse, have you throttled them back, potentially missing critical application-layer threats? You're not alone. Many Security Operations Centers (SOCs) struggle ...

What Integrity Means in the CIA Triad

In cybersecurity, the CIA Triad—Confidentiality, Integrity, and Availability—defines the three pillars of information security. Integrity, however, is often the least understood. So, what does integrity in the CIA Triad actually mean? The ...

True Threat Prevention Demands Browser Security & File Sanitization

The post True Threat Prevention Demands Browser Security & File Sanitization appeared first on Votiro. The post True Threat Prevention Demands Browser Security & File Sanitization appeared first on Security Boulevard.

USENIX 2025: PEPR ’25 – Privacy Paradigms For Law Enforcement Response

Creators, Authors and Presenters: Lukas Bundonis, Netflix; Ben Ballard, MITRE Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The ...

Introducing Scoped Organization Tokens for SonarQube Cloud

Secure your CI/CD pipelines with SonarQube Cloud's Scoped Organization Tokens (SOT). A resilient, user-decoupled way to manage authentication and prevent broken builds. The post Introducing Scoped Organization Tokens for SonarQube Cloud appeared ...

PyPI Warns Users of Fresh Phishing Campaign

Threat actors impersonating PyPI ask users to verify their email for security purposes, directing them to fake websites. The post PyPI Warns Users of Fresh Phishing Campaign appeared first on SecurityWeek.

Microsoft spots LLM-obfuscated phishing attack

Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake websites, and malware. There’s even been a documented instance ...

Black box penetration testing: pros and cons

Black box penetration testing is one method among many potential approaches to securing systems, applications, networks and cloud environments. As with anything, it has pros and cons. Black box penetration testing involves assessing an asset ...

Chainguard Libraries for JavaScript provides developers with malware-free dependencies

Chainguard released Chainguard Libraries for JavaScript, a collection of trusted builds of thousands of common JavaScript dependencies that are malware-resistant and built from source on SLSA L2 infrastructure. By securely building every library ...

How Regular CVE Scanning Reduces the Risk of RCE Attacks

Remote Code Execution (RCE) attacks remain one of the most dangerous cybersecurity threats, allowing attackers to take full control of systems and cause severe business damage. Regular CVE scanning is a key part of how to prevent RCE attacks, ...

Onapsis enhances SAP security with latest platform updates

Onapsis announced updates to its Onapsis Platform, including the launch of three new capabilities: the SAP Notes Command Center, Rapid Controls for Dangerous Exploits, and Alert on Anything for SAP Business Technology Platform (BTP). Together, ...

From Chaos to Control: Establishing an OSPO for Strategic Governance

The rise of open source software during the AI boom presents a dual outlook of unprecedented opportunities and risks. Governance gaps, security vulnerabilities, and compliance challenges can ripple across engineering teams, slowing innovation ...

Chinese Cyberspies Hacked US Defense Contractors

RedNovember has been targeting government, defense and aerospace, and legal services organizations worldwide. The post Chinese Cyberspies Hacked US Defense Contractors appeared first on SecurityWeek.

RTX Confirms Airport Services Hit by Ransomware

The aerospace and defense giant has disclosed the cyberattack in a filing with the SEC. The post RTX Confirms Airport Services Hit by Ransomware appeared first on SecurityWeek.