Application Security News and Articles


Over 300,000 Individuals Impacted by Vitas Hospice Data Breach

Vitas, the largest for-profit hospice chain in the United States, discovered a cybersecurity intrusion in October. The post Over 300,000 Individuals Impacted by Vitas Hospice Data Breach appeared first on SecurityWeek.

AI-driven threats are heading straight for the factory floor

In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She notes that in-house capability, especially for OT ...

AI agents break rules in unexpected ways

AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving every move. This shift is raising questions for security leaders. A new research ...

New image signature can survive cropping, stop deepfakes from hijacking trust

Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines one specific part of this problem. They introduced a way to keep ...

The simple shift that turns threat intel from noise into real insight

In this Help Net Security video, Alankrit Chona, CTO at Simbian, explains how security teams can put threat intelligence to work in a way that supports detection, response, and hunting. Chona walks through why many teams stumble. The problem is ...

Cybersecurity jobs available right now: December 9, 2025

Associate Analyst, Cyber Threat Intelligence Sony | USA | Remote – View job details As an Associate Analyst, Cyber Threat Intelligence, you will collect and analyze open-source threat data to identify signs of cyber threats. You ...

How AI-Enabled Adversaries Are Breaking the Threat Intel Playbook

The cybersecurity landscape is undergoing another seismic shift — one driven not just by AI-enabled attackers but by a structural imbalance in how defenders and adversaries innovate. John Watters traces the evolution of modern cyber ...

Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks

Chrome’s new agentic browsing protections include user alignment critic, expanded origin-isolation capabilities, and user confirmations. The post Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks appeared first on ...

INE Earns G2 Winter 2026 Badges Across Global Markets

Cary, North Carolina, USA, 8th December 2025, CyberNewsWire The post INE Earns G2 Winter 2026 Badges Across Global Markets appeared first on Security Boulevard.

CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

From a basement computer lab to the C-Suite: How Keith McCammon built his career and Red Canary with zero formal training. The post CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary appeared first on SecurityWeek.

NinjaOne rolls out secure, compliant remote access for IT teams

NinjaOne announced NinjaOne Remote, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, ...

Resemble AI Raises $13 Million for AI Threat Detection

The cybersecurity startup will use the investment to accelerate product development and fuel global expansion. The post Resemble AI Raises $13 Million for AI Threat Detection appeared first on SecurityWeek.

Veza brings unified visibility and control to AI agents across the enterprise

Veza has launched AI Agent Security, a purpose-built product to help organizations secure and govern AI agents at enterprise scale. As businesses accelerate AI adoption, Veza is defining a new foundation for AI SPM by giving security and ...

Download: Evaluating Password Monitoring Vendors

Organizations using Active Directory must update their password policies to block and detect compromised passwords. However, comparing vendors in this area can be challenging. By asking the right questions, you can identify the right partner and ...

Tri-Century Eye Care Data Breach Impacts 200,000 Individuals

Tri-Century Eye Care was targeted recently by the Pear ransomware group, which claimed to have stolen over 3 Tb of data.  The post Tri-Century Eye Care Data Breach Impacts 200,000 Individuals appeared first on SecurityWeek.

Ransomware Payments Surpassed $4.5 Billion: US Treasury

Ransomware payments reached the highest level in 2023, at $1.1 billion paid in 1,512 reported incidents. The post Ransomware Payments Surpassed $4.5 Billion: US Treasury appeared first on SecurityWeek.

Critical Apache Tika Vulnerability Leads to XXE Injection

The bug allows attackers to carry out XML External Entity (XXE) injection attacks via crafted XFA files inside PDF files. The post Critical Apache Tika Vulnerability Leads to XXE Injection appeared first on SecurityWeek.

Cloudflare Forces Widespread Outage to Mitigate Exploitation of Maximum Severity Vulnerability in React2Shell 

A critical React2Shell (CVE-2025-55182) RCE flaw in React and Next.js is being actively exploited by China-nexus threat groups, prompting urgent patching and global mitigations. The post Cloudflare Forces Widespread Outage to Mitigate ...

Exploitation of React2Shell Surges

An increasing number of threat actors have been attempting to exploit the React vulnerability CVE-2025-55182 in their attacks. The post Exploitation of React2Shell Surges appeared first on SecurityWeek.

The Developer’s Shield: A Guide to Securing Source Code

Your concern is valid: in the absence of a dedicated security team, developers are the first, and often only, line of defense for the…Continue reading on Medium »