Application Security News and Articles


BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats 

Eclypsium researchers have demonstrated a BadCam attack against Lenovo cameras, but others may be impacted as well. The post BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats  appeared first on SecurityWeek.

INE Named to Training Industry’s 2025 Top 20 Online Learning Library List

Cary, United States, 11th August 2025, CyberNewsWire The post INE Named to Training Industry’s 2025 Top 20 Online Learning Library List appeared first on Security Boulevard.

Nvidia and AMD Agree to Revenue Share with the US as Security Scrutiny Intensifies

Nvidia and AMD have reportedly reached an unprecedented agreement with the United States government to pay 15 percent of their revenues from certain chip sales in China in exchange for export licenses. The arrangement covers Nvidia’s H20 chips ...

How Brandolini’s law informs our everyday infosec reality

Brandolini’s law, also known as the “bullshit asymmetry principle”, is simple but devastating: “The amount of energy needed to refute bullshit is an order of magnitude bigger than to produce it.” While it’s often thrown ...

Ghanaian fraudsters arrested for BEC/Sakawa

 In Nigeria, scammers who specialize in Romance Scams and BEC are called "Yahoo Boys."  In Ghana, the term for the same activity is "Sakawa."  Several Ghanaian headlines are talking about this case with headlines such as "Multimillion dollar ...

From legacy to SaaS: Why complexity is the enemy of enterprise security

In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right ...

From NIST 800-53 to FedRAMP: What it really takes to bridge the gap

If your cloud platform is already compliant with NIST SP 800-53, you’ve laid important groundwork for security and risk management. But when the goal shifts to serving U.S. federal agencies, the bar is raised significantly. That’s where ...

Review: From Day Zero to Zero Day

From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author Eugene Lim ...

Pentesting is now central to CISO strategy

Security leaders are rethinking their approach to cybersecurity as digital supply chains expand and generative AI becomes embedded in critical systems. A recent survey of 225 security leaders conducted by Emerald Research found that 68% are ...

Breaches are up, budgets are too, so why isn’t healthcare safer?

A new report from Resilience outlines a growing cyber crisis in the U.S. healthcare sector, where ransomware attacks, vendor compromise, and human error continue to cause widespread disruption. In 2023, breaches exposed 168 million records, and ...

Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous

In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they’re effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from ...

Automating third-party risk for faster, smarter compliance in 2025

Leaders face an ever-greater array of risks in their supply chains and partner networks. One key area of concern is third-party risk, which has traditionally been managed using spreadsheets and manual processes. However, as the complexity and ...

Securing Machine Identities: Best Practices

Why is Machine Identity Security Essential? Do you find that businesses underestimate the significance of machine identity security? When innovation accelerates and we move our activities more to the cloud, securing machine identities, or ...

Ensuring Compliance Through Enhanced NHI Security

What comes to mind when we think of compliance in cybersecurity? For many, it’s a focus on human identities: creating secure passwords, providing access control, and educating employees on security best practices. However, there’s a growing ...

BSidesSF 2025: Confidential Computing: Protecting Customer Data In The Cloud

Creator/Author/Presenter: Jordan Mecom Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

Operation Chakra V: Call Center Scammers and your PII

Here we have another cautionary tale about off-shoring customer service when faced with the reality of Call Center Scams that commit fraud via Tech Support Scams and Government Impersonation. In this case, FirstIdea, an Indian company is charged ...

Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2025 Black Hat USA 2025 took place at the Mandalay Bay Convention Center in Las Vegas. Explore related news, photos, product ...

Federated Identity Management using OpenID Connect

Explore federated identity management using OpenID Connect for secure enterprise single sign-on. Learn about benefits, implementation, and how it enhances security and user experience. The post Federated Identity Management using OpenID Connect ...

Passkeys recovery and management strategies

Learn effective passkey recovery and management strategies for secure, user-friendly passwordless authentication. Implement fallback methods and enhance security. The post Passkeys recovery and management strategies appeared first on Security ...

OMEN Improvements

“If I had an hour to solve a problem, I would spend 55 minutes thinking about the problem and five minutes finding the solution.” - Albert Einstein Introduction: I'm a big fan of graphing password cracking sessions. It's a good way to figure ...