Application Security News and Articles


Cybersecurity M&A Roundup: 40 Deals Announced in September 2025

Significant cybersecurity M&A deals announced by Check Point, CrowdStrike, F5, Mitsubishi Electric, and SentinelOne.  The post Cybersecurity M&A Roundup: 40 Deals Announced in September 2025 appeared first on SecurityWeek.

OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning

OPSWAT launched MetaDefender Drive with Smart Touch, a portable cybersecurity device designed for malware and compliance scanning of transient cyber assets regardless of network connectivity. It works across servers, desktops, and laptops before ...

Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882)

Resecurity and watchTowr researchers have analyzed the leaked scripts used by attackers to exploit CVE-2025-61882 on internet-facing Oracle ESB instances. Whether the attackers were Cl0p or LAPSUS$, both, or even additional threat actors is still ...

CMMC and NIST Password Compliance 101: Are They Different?

See how CMMC and NIST password compliance align. Why it matters for DoD contractors, and how Enzoic helps block weak & compromised passwords. The post CMMC and NIST Password Compliance 101: Are They Different? appeared first on Security ...

Filigran Raises $58 Million in Series C Funding

The company plans to expand to new markets, fuel the development of a new module for its platform, and accelerate AI integration. The post Filigran Raises $58 Million in Series C Funding appeared first on SecurityWeek.

Edge device security: The frontline of your network

Edge devices such as routers, IoT sensors, smart cameras, and industrial controllers are the gateways between your network and the outside world. Their role in processing data closer to the source makes them powerful, but it also places them ...

Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations

BIETA and its subsidiary CIII research develop and sell technologies supporting China’s intelligence, counterintelligence, and military operations. The post Security Firm Exposes Role of Beijing Research Institute in China’s Cyber ...

Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks

The Medusa ransomware operators exploited the GoAnywhere MFT vulnerability one week before patches were released. The post Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks appeared first on SecurityWeek.

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn

The Year 2036/2038 problem is a bug that will be triggered in more than a decade, but hackers could exploit it today against ICS and consumer devices. The post The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn appeared ...

Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation

Authenticated attackers can exploit the security flaw to trigger a use-after-free and potentially execute arbitrary code. The post Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation appeared first on SecurityWeek.

Understanding Eye Vein Biometrics

Explore eye vein biometrics for authentication. Learn about its technology, security, development aspects, and how it compares to passwordless authentication methods. The post Understanding Eye Vein Biometrics appeared first on Security Boulevard.

Survey Sees AI Becoming Top Cybersecurity Investment Priority

AI tops cybersecurity investments for 2025 as organizations leverage threat detection, AI agents, and behavioral analysis to close skills gaps and boost defense. The post Survey Sees AI Becoming Top Cybersecurity Investment Priority appeared ...

The Evolving Role of the CSO: From Technical Guardian to Business Strategist  

Discover how today’s CSOs are transforming from technical guardians into strategic business leaders driving revenue, growth, and customer trust. The post The Evolving Role of the CSO: From Technical Guardian to Business Strategist   appeared ...

Cortex Cloud Code Security: A Comprehensive Guide

The rise of cloud-native applications has transformed the way enterprises build, deploy, and manage their software. While this shift…Continue reading on Medium »

Best Website Builders of 2025

Secure Boot is a technology that ensures the system firmware checks that the system boot loader is signed with a cryptographic key authorized by a database cont The post Best Website Builders of 2025 appeared first on Security Boulevard.

How to get better results from bug bounty programs without wasting money

The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that would otherwise slip through. A new academic study based on Google’s Vulnerability Rewards Program (VRP) offers ...

The architecture of lies: Bot farms are running the disinformation war

Bot farms have moved into the center of information warfare, using automated accounts to manipulate public opinion, influence elections, and weaken trust in institutions. Algorithms reward noise over truth Thales reports that in 2024, automated ...

Cybersecurity’s next test: AI, quantum, and geopolitics

Geopolitics, emerging technology, and skills shortages are reshaping cybersecurity priorities across industries, according to a new PwC report. The findings show a mix of rising awareness, persistent weaknesses, and uneven preparation for the ...

Cybersecurity jobs available right now: October 7, 2025

Application Security / DevSecOps Engineer AvetixCyber | USA | Remote – View job details As an Application Security / DevSecOps Engineer, you will integrate security tools and processes into CI/CD pipelines, perform secure code ...

TDL 006 | Beyond the Firewall: How Attackers Weaponize Your DNS

Summary Beyond the Firewall: How Attackers Weaponize Your DNS For many IT professionals, DNS is the internet’s invisible plumbing, historically managed by a “guy with a Unix beard in the basement,” as Infoblox educator Josh Kuo recalled on ...