Application Security News and Articles
Summary
Beyond the Firewall: How Attackers Weaponize Your DNS
For many IT professionals, DNS is the internet’s invisible plumbing, historically managed by a “guy with a Unix beard in the basement,” as Infoblox educator Josh Kuo recalled on ...
The Cl0p ransomware group exploited a zero-day security flaw in Oracle's E-Business Suite to compromise corporate networks and steal data, according to Mandiant. The threat actors are sending emails to executives of those companies demanding ...
Are Your Cybersecurity Measures Equipped to Handle the Unique Challenges of Non-Human Identities? Where cybersecurity threats evolve by the minute, are your cybersecurity measures truly robust enough to handle the increasing complexity of ...
How Do Non-Human Identities Impact Cybersecurity? With organizations increasingly adopt sophisticated technologies, the importance of securing Non-Human Identities (NHIs) grows ever more critical. But how can businesses ensure the safety of these ...
How Secure Are Your Machine Identities? Where cyber threats continue to increase in sophistication and frequency, how effectively are organizations managing their machine identities? The concept of Non-Human Identities (NHIs) is fast becoming a ...
In today’s cloud-first world, cybersecurity teams are drowning in complexity. Enterprises and MSSPs juggle dozens of disconnected tools, each addressing a single slice of the threat landscape, leaving blind spots, integration gaps, and rising ...
Your Castle Is Already Breached Picture this: your organization’s network is a medieval castle, complete with drawbridge and moat. For decades, this mental model worked. Keep the bad guys outside the walls, and everyone inside stays safe. ...
ADAMnetworks® is thrilled to announce the release of a featurette by ONE9 highlighting the groundbreaking technologies of ADAMnetworks. This exclusive look delves into how ADAMnetworks is revolutionizing the digital landscape with its innovative ...
Oct 06, 2025 - Alan Fagan - Operationalizing Defense
The key to catching ASCII Smuggling is monitoring the raw input payload, the exact string the LLM tokenization engine receives, not just the visible text.
Ingestion: FireTail continuously ...
Alan Snyder, CEO of NowSecure, discusses the growing challenges and overlooked risks in mobile app security. Despite the explosion of enterprise mobile use, Snyder notes that mobile applications remain one of the most under-secured components of ...
Contrast Security and IBM Consulting have joined forces to address one of the most urgent gaps in enterprise cybersecurity: the application layer. As companies accelerate development, pushing code as fast as several times a day, attackers are ...
Jamie Levy, director of adversary tactics at Huntress, highlights a rare and revealing incident: a cybercriminal downloaded Huntress’ software, inadvertently giving defenders a front-row seat into how attackers are experimenting with artificial ...
Names, usernames, email addresses, contact information, IP addresses, and billing information was compromised.
The post Discord Says User Information Stolen in Third-Party Data Breach appeared first on SecurityWeek.
Scattered Lapsus$ Hunters launched a data leak site over the weekend, aiming to pressure organizations whose Salesforce databases they have plundered into paying to prevent the stolen data from being released. Screenshot of Scattered Lapsus$ ...
DevOpsDays Philadelphia 2025 showed how AI governance, secrets security, runtime traces, and ablative resilience work together to reduce operational risk.
The post DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime ...
The flaw could lead to local code execution, allowing attackers to access confidential information on devices running Unity-built applications.
The post Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk appeared first on ...
The financial services industry stands at a critical crossroads.As cyber threats grow smarter and more relentless, banks, insurers, and investment firms face rising breach costs — averaging over $6 million per incident. These attacks don’t ...
Part two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures.
Key ...
The education sector has transformed rapidly — digital classrooms, cloud-based research, and connected campuses are now the norm. But with innovation comes risk. Schools and universities store highly sensitive data — from student records and ...
How Seceon’s OTM Platform Protects the Digital Factory Cybersecurity has become the new backbone of modern manufacturing.With smart factories, IoT devices, robotics, and cloud systems connecting every part of the production chain, manufacturers ...