Application Security News and Articles


ShadyPanda Takes its Time to Weaponize Legitimate Extensions 

ShadyPanda spent seven years uploading trusted Chrome and Edge extensions, later weaponizing them for tracking, hijacking, and remote code execution. Learn how the campaign unfolded. The post ShadyPanda Takes its Time to Weaponize Legitimate ...

Lumia Security Raises $18 Million for AI Security and Governance

The startup will invest in expanding its engineering and research teams, deepening product integrations, and scaling go-to-market efforts. The post Lumia Security Raises $18 Million for AI Security and Governance appeared first on SecurityWeek.

Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps

Cloudflare recently mitigated a new record-breaking Aisuru attack that peaked at 14.1 Bpps. The post Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps appeared first on SecurityWeek.

Ghost-Tap Scam Makes Payments Scarier 

The BBB warns of a rising ghost-tap scam exploiting tap-to-pay cards and mobile wallets. How attackers use NFC proximity tricks. The post Ghost-Tap Scam Makes Payments Scarier  appeared first on Security Boulevard.

CrowdStrike Extends Scope of AWS Cybersecurity Alliance

CrowdStrike deepens its AWS partnership with automated Falcon SIEM configuration, AI security capabilities, EventBridge integrations and new MSSP-focused advancements. The post CrowdStrike Extends Scope of AWS Cybersecurity Alliance appeared ...

Helmet Security Emerges From Stealth Mode With $9 Million in Funding

Helmet Security has built an end-to-end platform that secures the infrastructure for agentic AI communication. The post Helmet Security Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek.

Wiz vs SonarQube vs Qualys: Which Tool Should You Pick?

When it comes to securing your software and infrastructure, picking the right tool can be tricky. Wiz, SonarQube, and Qualys are three…Continue reading on Medium »

Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities

Check Point announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify zero trust across hybrid networks. “As ...

Chinese Hackers Exploiting React2Shell Vulnerability

AWS has seen multiple China-linked threat groups attempting to exploit the React vulnerability CVE-2025-55182. The post Chinese Hackers Exploiting React2Shell Vulnerability appeared first on SecurityWeek.

Building the missing layers for an internet of agents

Cybersecurity teams are starting to think about how large language model agents might interact at scale. A new paper from Cisco Research argues that the current network stack is not prepared for this shift. The work proposes two extra layers on ...

What security leaders should watch for when companies buy or sell a business

In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, and divestitures. Sullivan talks about the types of risk an acquiring ...

Data brokers are exposing medical professionals, and turning their personal lives into open files

Large amounts of personal information about medical professionals are available on people search sites. A new analysis by Incogni’s researchers shows how much data about doctors appears online and how easily it can be found. The findings should ...

New infosec products of the week: December 5, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BlackFog, Datadog, Forward Edge-AI, SandboxAQ, and Upwind. BlackFog releases ADX Vision to block data loss from unapproved AI use BlackFog announced the ...

India Rolls Back Order to Preinstall Cybersecurity App on Smartphones

The Ministry of Communications on had asked smartphone makers to install the government’s “Sanchar Saathi” app within 90 days and to prevent users from disabling it. The post India Rolls Back Order to Preinstall Cybersecurity App on ...

Cybersecurity M&A Roundup: 30 Deals Announced in November 2025

Significant cybersecurity M&A deals announced by Arctic Wolf, Bugcrowd, Huntress, Palo Alto Networks, and Zscaler. The post Cybersecurity M&A Roundup: 30 Deals Announced in November 2025 appeared first on SecurityWeek.

Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps

Security and developer teams are scrambling to address a highly critical security flaw in frameworks tied to the popular React JavaScript library. Not only is the vulnerability, which also is in the Next.js framework, easy to exploit, but React ...

Agentic Security Firm 7AI Raises $130 Million

Established in 2024 by Cybereason co-founders Lior Div and Yonatan Striem-Amit, the company has raised a total of $166 million in funding. The post Agentic Security Firm 7AI Raises $130 Million appeared first on SecurityWeek.

Inotiv Says Personal Information Stolen in Ransomware Attack

Hackers stole the names, addresses, Social Security numbers, and financial and medical information of 9,542 people. The post Inotiv Says Personal Information Stolen in Ransomware Attack appeared first on SecurityWeek.

Malicious Rust packages targeted Web3 developers

A malicious Rust crate (package) named evm-units, aimed at stealing cryptocurrency from unsuspecting developers, has been pulled from the official public package registry for the Rust programming language, but not before having been downloaded ...

SpecterOps and Tines partner to add native BloodHound and automated attack path workflows

SpecterOps and Tines announced a strategic partnership that brings native BloodHound integration to Tines, enabling customers to operationalize Attack Path Management through automated, AI-assisted workflows. This partnership combines ...