Application Security News and Articles


Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

UNFInished business: We were warned this would happen. And now here we are. The post Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard.

Best of 2025: NIST Launches Updated Incident Response Guide

The National Institute of Standards and Technology (NIST) has released a long-awaited update to its incident response guidance: Special Publication 800-61 Revision 3 (SP 800-61r3). This new version, titled “Incident Response Recommendations and ...

Kritik Güvenlik Açıklarına Karşı Hangi Önlemler Alınmalı? (SCA ve SAST)

Yazılım geliştirme dünyasında, özellikle “Time-to-Market” baskısı altında çalışırken, güvenlik genellikle “daha sonra bakarız” ...

Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks

Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware group. The post Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks appeared first on SecurityWeek.

Flock Exposes Its AI-Enabled Surveillance Cameras

404 Media has the story: Unlike many of Flock’s cameras, which are designed to capture license plates as people drive by, Flock’s Condor cameras are pan-tilt-zoom (PTZ) cameras designed to record and track people, not vehicles. Condor ...

RondoDox Botnet Exploiting React2Shell Vulnerability

In December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable Next.js servers. The post RondoDox Botnet Exploiting React2Shell Vulnerability appeared first on SecurityWeek.

The MSSP Security Management Platform: Enabling Scalable, Intelligence-Driven Cyber Defense

Introduction: Why MSSPs Need a New Security Backbone Managed Security Service Providers (MSSPs) are operating in one of the most demanding environments in cybersecurity today. They are expected to defend multiple organizations simultaneously, ...

Covenant Health Data Breach Impacts 478,000 Individuals

The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025.  The post Covenant Health Data Breach Impacts 478,000 Individuals appeared first on SecurityWeek.

Adobe ColdFusion Servers Targeted in Coordinated Campaign

GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday. The post Adobe ColdFusion Servers Targeted in Coordinated Campaign appeared first on SecurityWeek.

Top CVEs of December 2025

December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the... The post Top CVEs of December 2025 appeared first on ...

Email-first cybersecurity predictions for 2026

Explore key cybersecurity predictions for 2026, from AI-powered phishing to DMARC enforcement, BIMI adoption, SPF and DKIM limits, Zero Trust, and automation. The post Email-first cybersecurity predictions for 2026 appeared first on Security ...

What shadow AI means for SaaS security and integrations

In this Help Net Security video, Jaime Blasco, CTO at Nudge Security, discusses why shadow AI matters to security teams. He describes how AI adoption happens in two ways, through company led programs and through employees choosing tools on their ...

From experiment to production, AI settles into embedded software development

AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from experiment to production AI tools have become standard in embedded development workflows. More than ...

How AutoSecT Helps Security Teams Handle 1000+ Endpoints Effortlessly?

Managing security across 1000+ endpoints is no longer a scale problem alone; it is a complexity problem. Modern enterprise environments are dynamic, hybrid, and API-driven. Cloud workloads, remote employees, containerized services, and ...

Hospitals are drowning in threats they can’t triage

Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This article outlines the pressures, gaps, and decisions shaping healthcare’s security future. Data brokers are exposing ...

Post-Quantum Identity and Access Management for AI Agents

Secure your AI infrastructure with post-quantum identity and access management. Protect MCP deployments from quantum-enabled threats using PQC and zero-trust. The post Post-Quantum Identity and Access Management for AI Agents appeared first on ...

Types of Authentication: Complete Guide to Authentication Methods & Mechanisms

Explore various types of authentication methods including MFA, SSO, and Biometrics. Learn how to secure enterprise apps and prevent data breach. The post Types of Authentication: Complete Guide to Authentication Methods & Mechanisms appeared ...

Are Passkeys Ready for Use in Enterprises?

Explore the readiness of passkeys for enterprise use. Learn about FIDO2, WebAuthn, phishing resistance, and the challenges of legacy IT integration. The post Are Passkeys Ready for Use in Enterprises? appeared first on Security Boulevard.

Connection String Parameter Pollution — SSC Fortify Security Findings Analysis — Part 4

“Your database connection is a bridge — don’t let attackers rebuild it mid-crossing.”Continue reading on Medium »

Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability

When security vulnerabilities appear in popular frameworks, they can affect thousands of websites overnight. That’s exactly what’s happening with a newly discovered vulnerability in Next.js – one of the most... The post CVE-2025-29927 – ...