Application Security News and Articles


TDL 006 | Beyond the Firewall: How Attackers Weaponize Your DNS

Summary Beyond the Firewall: How Attackers Weaponize Your DNS For many IT professionals, DNS is the internet’s invisible plumbing, historically managed by a “guy with a Unix beard in the basement,” as Infoblox educator Josh Kuo recalled on ...

Cl0p Ransomware Group Exploited in a Zero-Day in Oracle EBS Attacks

The Cl0p ransomware group exploited a zero-day security flaw in Oracle's E-Business Suite to compromise corporate networks and steal data, according to Mandiant. The threat actors are sending emails to executives of those companies demanding ...

Are Your NHIs Capable Enough for New Threats?

Are Your Cybersecurity Measures Equipped to Handle the Unique Challenges of Non-Human Identities? Where cybersecurity threats evolve by the minute, are your cybersecurity measures truly robust enough to handle the increasing complexity of ...

Staying Ahead with Proactive NHI Security

How Do Non-Human Identities Impact Cybersecurity? With organizations increasingly adopt sophisticated technologies, the importance of securing Non-Human Identities (NHIs) grows ever more critical. But how can businesses ensure the safety of these ...

Creating Adaptable NHIs for Dynamic Markets

How Secure Are Your Machine Identities? Where cyber threats continue to increase in sophistication and frequency, how effectively are organizations managing their machine identities? The concept of Non-Human Identities (NHIs) is fast becoming a ...

Introducing Seceon aiSIEM CGuard 2.0: A Revolutionary Leap in Cloud Threat Detection and Response

In today’s cloud-first world, cybersecurity teams are drowning in complexity. Enterprises and MSSPs juggle dozens of disconnected tools, each addressing a single slice of the threat landscape, leaving blind spots, integration gaps, and rising ...

From Fortresses to Zero-Trust: What Baghdad’s Green Zone Teaches Us About Modern Cybersecurity

Your Castle Is Already Breached Picture this: your organization’s network is a medieval castle, complete with drawbridge and moat. For decades, this mental model worked. Keep the bad guys outside the walls, and everyone inside stays safe. ...

ONE9 Spotlights ADAMnetworks Technologies in New Featurette

ADAMnetworks® is thrilled to announce the release of a featurette by ONE9 highlighting the groundbreaking technologies of ADAMnetworks. This exclusive look delves into how ADAMnetworks is revolutionizing the digital landscape with its innovative ...

Ghosts in the Machine: ASCII Smuggling across Various LLMs – FireTail Blog

Oct 06, 2025 - Alan Fagan - Operationalizing Defense The key to catching ASCII Smuggling is monitoring the raw input payload, the exact string the LLM tokenization engine receives, not just the visible text. Ingestion: FireTail continuously ...

Mobile App Security: Why It’s Still the Weakest Link in Enterprise Defense

Alan Snyder, CEO of NowSecure, discusses the growing challenges and overlooked risks in mobile app security. Despite the explosion of enterprise mobile use, Snyder notes that mobile applications remain one of the most under-secured components of ...

Real-Time Application Security at Scale | IBM Consulting + Contrast Security

Contrast Security and IBM Consulting have joined forces to address one of the most urgent gaps in enterprise cybersecurity: the application layer. As companies accelerate development, pushing code as fast as several times a day, attackers are ...

Inside the Hacker’s Playbook—Adversarial AI Up Close

Jamie Levy, director of adversary tactics at Huntress, highlights a rare and revealing incident: a cybercriminal downloaded Huntress’ software, inadvertently giving defenders a front-row seat into how attackers are experimenting with artificial ...

Discord Says User Information Stolen in Third-Party Data Breach

Names, usernames, email addresses, contact information, IP addresses, and billing information was compromised. The post Discord Says User Information Stolen in Third-Party Data Breach appeared first on SecurityWeek.

Hackers launch data leak site to extort 39 victims, or Salesforce

Scattered Lapsus$ Hunters launched a data leak site over the weekend, aiming to pressure organizations whose Salesforce databases they have plundered into paying to prevent the stolen data from being released. Screenshot of Scattered Lapsus$ ...

DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime Risks, And How AI Is Changing It

DevOpsDays Philadelphia 2025 showed how AI governance, secrets security, runtime traces, and ablative resilience work together to reduce operational risk. The post DevOps Days Philadelphia 2025: Security As A Control Loop, Resilience, Runtime ...

Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk

The flaw could lead to local code execution, allowing attackers to access confidential information on devices running Unity-built applications. The post Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk appeared first on ...

Strategies for Financial Services to Reduce Average Breach Costs of $6 Million

The financial services industry stands at a critical crossroads.As cyber threats grow smarter and more relentless, banks, insurers, and investment firms face rising breach costs — averaging over $6 million per incident. These attacks don’t ...

How Exposure Management Helped Three Companies Transform Their Cybersecurity Program

Part two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures.  Key ...

From Months to Minutes: How Seceon’s Unified Platform Saves Education $300K+ Annually

The education sector has transformed rapidly — digital classrooms, cloud-based research, and connected campuses are now the norm. But with innovation comes risk. Schools and universities store highly sensitive data — from student records and ...

Defending Manufacturing from Cyber Attacks with AI-Driven Security

How Seceon’s OTM Platform Protects the Digital Factory Cybersecurity has become the new backbone of modern manufacturing.With smart factories, IoT devices, robotics, and cloud systems connecting every part of the production chain, manufacturers ...