Application Security News and Articles


The organizational structure of ransomware threat actor groups is evolving before our eyes

The Ransomware-as-a-service (RaaS) model has not recovered from law enforcement disruption, and the entrance of novice actors along with non-Russian state-linked cybercriminals has led to uncertain outcomes for victims. The post The ...

Kubernetes Resource Optimization & Best Practices with Goldilocks

Kubernetes is now the industry standard for orchestrating containerized workloads, but efficient resource management remains a challenge for many organizations. It’s important to get right though! Over-provisioning leads to wasted cloud spend, ...

The Rise of AI-Driven Cyberattacks: Accelerated Threats Demand Predictive and Real-Time Defenses 

Artificial intelligence (AI) is transforming industries, but it’s also empowering cybercriminals to launch sophisticated, high-speed cyberattacks. AI-driven attacks, particularly those orchestrated by autonomous AI agents, operate at an ...

Vulnerability Management: A Race Against Time & Complexity

The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation. The post Vulnerability Management: A Race Against Time & Complexity appeared first on Security Boulevard.

Report Exposes Soft Security Underbelly of Mobile Computing

Zimperium, this week during the 2025 RSA Conference, shared an analysis of mobile computing environments that finds more than 60% of iOS and 34% of Android apps lack basic code protection, with nearly 60% of iOS and 43% of Android apps also ...

BSidesLV24 – Ground Truth – I Won’t Allow My Child To Have A Smartphone: Why Smart Parents Make Not So Smart Children

Authors/Presenters: Arun Vishwanath Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Mobile and third-party risk: How legacy testing leaves you exposed

Risks to software supply chains from mobile applications are increasing, largely due to a lack of deeper visibility into their codebase, a new study has found.  The post Mobile and third-party risk: How legacy testing leaves you exposed appeared ...

MY TAKE: RSAC 2025 – Conversing with vendors hanging out in the Marriott Marquis mezzanine

SAN FRANCISCO — Sometimes, the best insights come not from the keynote stage, but from the hotel lobby. Related: RSAC 2025 top takeaways In between sessions at RSAC 2025, I slipped over to the Marriott lobby and held quick, … (more…) The ...

Best 10 SOC Tools for Security Operations and Threat Detection

In today’s digital world, cybersecurity is as much about smart tools as it is about the people who use them. Modern Security Operations Centers (SOCs) are at the heart of an organization’s defense.  But behind the shiny dashboards and ...

Canadian Electric Utility Hit by Cyberattack

Nova Scotia Power and Emera are responding to a cybersecurity incident that impacted IT systems and networks.  The post Canadian Electric Utility Hit by Cyberattack appeared first on SecurityWeek.

Critical Vulnerabilities and Top CVEs of April 2025

Some vulnerabilities make headlines. Others quietly become someone’s worst day at work. The critical CVEs 2025 that surfaced in April weren’t just technical flaws, they were real entry points. Into... The post Critical Vulnerabilities and Top ...

Photos: RSAC 2025, part 2

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event. The first gallery is here. The featured vendors are: Tines, Thales, Sumo Logic, N-able, ...

Year of the Twin Dragons: Developers Must Slay the Complexity and Security Issues of AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for developers to resist. But the complexity and risk created by AI-generated code can’t be ignored. The post Year of the Twin Dragons: Developers Must Slay the Complexity ...

More Details Come to Light on Commvault Vulnerability Exploitation

Commvault has shared indicators of compromise associated with the exploitation of a vulnerability by state-sponsored hackers. The post More Details Come to Light on Commvault Vulnerability Exploitation appeared first on SecurityWeek.

Chinese APT’s Adversary-in-the-Middle Tool Dissected

ESET has analyzed Spellbinder, the IPv6 SLAAC spoofing tool Chinese APT TheWizards uses to deploy its WizardNet backdoor. The post Chinese APT’s Adversary-in-the-Middle Tool Dissected appeared first on SecurityWeek.

Actions Over Words: Career Lessons for the Security Professional

In a world full of noise and promises, it’s those who consistently deliver behind the scenes who build the most respected and rewarding careers. The post Actions Over Words: Career Lessons for the Security Professional appeared first on ...

From Policy to Practice: How to Operationalize SaaS Compliance at Scale

SaaS misconfigurations can silently lead to compliance failures and security risks. Learn how operationalizing compliance with AppOmni helps security teams enforce policies, monitor continuously, and stay audit-ready. The post From Policy to ...

SonicWall Flags Two More Vulnerabilities as Exploited

SonicWall has updated the advisories for two vulnerabilities to warn that they are being exploited in the wild. The post SonicWall Flags Two More Vulnerabilities as Exploited appeared first on SecurityWeek.

Ascension Discloses Data Breach Potentially Linked to Cleo Hack

Ascension is notifying over 100,000 people that their personal information was stolen in a data breach potentially linked to the Cleo hack. The post Ascension Discloses Data Breach Potentially Linked to Cleo Hack appeared first on SecurityWeek.

AI Security Risks: Jailbreaks, Unsafe Code, and Data Theft Threats in Leading AI Systems

In recent reports, significant security vulnerabilities have been uncovered in some of the world’s leading generative AI systems, such as OpenAI’s GPT-4, Anthropic’s Claude, and Google’s Gemini. While these AI models have revolutionized ...