Application Security News and Articles


INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskilling

Cary, North Carolina, USA, 18th December 2025, CyberNewsWire The post INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskilling appeared first on Security Boulevard.

NDSS 2025 – PhantomLiDAR: Cross-Modality Signal Injection Attacks Against LiDAR

Session 6C: Sensor Attacks Authors, Creators & Presenters: Zizhi Jin (Zhejiang University), Qinhong Jiang (Zhejiang University), Xuancun Lu (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu ...

Client ID Metadata Documents (CIMD): The Future of MCP Authentication

Struggling with MCP authentication? The November 2025 spec just changed everything. CIMD replaces DCR's complexity with a simple URL-based approach—no registration endpoints, no client ID sprawl, built-in identity verification. Here's your ...

The Agentic Era is Here: Announcing the 4th Edition of AI & API Security For Dummies

If you look at the headlines, the story is about Artificial Intelligence. But if you look at the architecture, the story is about APIs. The reality of modern tech is simple: You can’t have AI security without API security. As we move rapidly ...

TruffleNet and Cloud Abuse at Scale: An Identity Architecture Failure

The recent TruffleNet campaign, first documented by Fortinet, highlights a familiar and uncomfortable truth for security leaders: some of the most damaging cloud attacks aren’t exploiting zero-day vulnerabilities. They’re exploiting identity ...

7 Common IDP Implementation Pitfalls (and How to Avoid Them)

For platform engineering and DevOps leaders, implementing and scaling an Internal Developer Platform (IDP) has become both a top priority and a major source of risk. This guide is for teams building IDPs on Kubernetes and public cloud, outlining ...

Beyond Rules and Alerts: How Behavioral Threat Analytics Redefines Modern Cyber Defense

Executive Summary Modern cyber adversaries no longer depend on loud malware, obvious exploits, or easily identifiable indicators of compromise. Instead, they leverage legitimate credentials, trusted tools, and native system functions to operate ...

Why AppSec and Network Risk Management Must Be Unified in the Modern Enterprise

See how Mend.io’s ServiceNow integration unifies application, network, and operational risk. The post Why AppSec and Network Risk Management Must Be Unified in the Modern Enterprise appeared first on Security Boulevard.

NDSS 2025 – TME-Box: Scalable In-Process Isolation Through Intel TME-MK Memory Encryption

Session 6B: Confidential Computing 1 Authors, Creators & Presenters: Martin Unterguggenberger (Graz University of Technology), Lukas Lamster (Graz University of Technology), David Schrammel (Graz University of Technology), Martin Schwarzl ...

UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks

ASRock, Asus, Gigabyte, and MSI motherboards are vulnerable to early-boot DMA attacks. The post UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks appeared first on SecurityWeek.

Crypto theft in 2025: North Korean hackers continue to dominate

When they strike cryptocurrency-related targets, North Korean hacking groups are increasingly aiming for large services where a single breach can move serious money, a new Chainalysis report on crypto theft in 2025 revealed. “North Korean ...

MCP vs. Traditional API Security: Key Differences

6 min readSecuring MCP requires a fundamentally different approach than traditional API security. The post MCP vs. Traditional API Security: Key Differences appeared first on Aembit. The post MCP vs. Traditional API Security: Key Differences ...

HPE Patches Critical Flaw in IT Infrastructure Management Software

Tracked as CVE-2025-37164, the critical flaw could allow unauthenticated, remote attackers to execute arbitrary code. The post HPE Patches Critical Flaw in IT Infrastructure Management Software appeared first on SecurityWeek.

Identity Over Network: Why 2026 Zero Trust Is About Who/What, Not Where

5 min readTrue zero trust requires verified identity at every request and eliminating static credentials entirely. The post Identity Over Network: Why 2026 Zero Trust Is About Who/What, Not Where appeared first on Aembit. The post Identity Over ...

Apiiro unveils AI SAST built on deep code analysis to eliminate false positives

Apiiro introduced Apiiro AI SAST, a new approach to static application security testing (SAST) that automates code risk detection, validation and fixes with the precision and cognitive process of an expert application security engineer. Grounded ...

The Power of Large Language Models for Cybersecurity 

Our dependence on digital infrastructure has grown exponentially amid unprecedented technological advancements. With this reliance comes an increasingly threatening landscape and expanding attack surfaces. As cyberthreats become more ...

Clipping Scripted Sparrow’s wings: Tracking a global phishing ring

Between June 2024 and December 2025, Fortra analysts tracked a persistent business email compromise (BEC) operation that we have now classified as Scripted Sparrow. The group carries out well-crafted highly targeted phishing campaigns that ...

AppGate extends zero trust to secure AI workloads with Agentic AI Core Protection

AppGate announced the launch of Agentic AI Core Protection, a new capability within AppGate ZTNA designed to secure AI workloads deployed in enterprise core environments across on-prem and cloud venues. This innovation enables organizations to ...

Microsoft 365 users targeted in device code phishing attacks

Attackers are targeting Microsoft 365 users with device code authorization phishing, a technique that fools users into approving access tokens, Proofpoint warns. The method abuses Microsoft’s OAuth 2.0 device authorization grant flow by ...

What the Latest OpenAI Security Breach Reveals About the State of AI Protection 

A recent OpenAI-related breach via third-party provider Mixpanel exposes how AI supply chain vulnerabilities enable phishing, impersonation, and regulatory risk—even without direct system compromise. The post What the Latest OpenAI ...