Application Security News and Articles


When One Phish Poisons the Pipeline: Supply Chain Phishing on the Rise

Modern supply chains run on code, models, and email. The last one is still the easiest way to start a very bad day. The post When One Phish Poisons the Pipeline: Supply Chain Phishing on the Rise appeared first on Security Boulevard.

Organizations Warned of Exploited Meteobridge Vulnerability

Patched in mid-May, the security defect allows remote unauthenticated attackers to execute arbitrary commands with root privileges. The post Organizations Warned of Exploited Meteobridge Vulnerability appeared first on SecurityWeek.

MokN Raises $3 Million for Phish-Back Solution

The French cybersecurity startup tricks attackers into revealing stolen credentials so they can be neutralized. The post MokN Raises $3 Million for Phish-Back Solution appeared first on SecurityWeek.

Cookie Consent, Transparency, and Consumer Control: Why It Matters in 2025

The post <b>Cookie Consent, Transparency, and Consumer Control: Why It Matters in 2025</b> appeared first on Sovy. The post Cookie Consent, Transparency, and Consumer Control: Why It Matters in 2025 appeared first on Security ...

Bridging Mobile Security and IAM: What iPhone Unlocking Teaches Us About User Access

Discover how iPhone unlocking parallels IAM (Identity & Access Management). Learn what mobile security teaches about authentication, authorization, and recovery. The post Bridging Mobile Security and IAM: What iPhone Unlocking Teaches Us ...

Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks

The software giant’s investigation showed that vulnerabilities patched in July 2025 may be involved. The post Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks appeared first on SecurityWeek.

Top Vulnerability Management Tools for the Future

Discover the best vulnerability management tools for the future, focusing on enterprise SSO, CIAM, and single sign-on providers. Enhance your cybersecurity strategy today. The post Top Vulnerability Management Tools for the Future appeared first ...

Enterprise Vulnerability Management: Key Processes and Tools

Learn about key processes and tools for enterprise vulnerability management, including vulnerability scanning, risk prioritization, and remediation strategies. The post Enterprise Vulnerability Management: Key Processes and Tools appeared first ...

Beyond IPs: Why Your Next Firewall Ruleset Will be Written in Identity 

The shift from IP-based ACLs to identity-aware microsegmentation is key to zero-trust. Learn how to build resilient, intent-based policies that survive re-IP. The post Beyond IPs: Why Your Next Firewall Ruleset Will be Written in Identity  ...

Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities

High-severity flaws were patched in Chrome’s WebGPU and Video components, and in Firefox’s Graphics and JavaScript Engine components. The post Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities appeared first on SecurityWeek.

Eye Vein Verification Technology Explained

Explore eye vein verification technology: how it enhances authentication, software development challenges, security, and future applications. A deep dive. The post Eye Vein Verification Technology Explained appeared first on Security Boulevard.

The Hidden $150,000 Cost of a “Simple” SSO Feature

The Hidden $150,000 Cost of a "Simple" SSO Feature The post The Hidden $150,000 Cost of a “Simple” SSO Feature appeared first on Security Boulevard.

When loading a model means loading an attacker

You probably think twice before downloading a random app or opening an unfamiliar email attachment. But how often do you stop to consider what happens when your team downloads and loads a machine learning model? A recent study shows why you ...

Red Hat Confirms GitLab Instance Hack, Data Theft

Hackers claim to have stolen 28,000 private repositories, including data associated with major companies that use Red Hat services. The post Red Hat Confirms GitLab Instance Hack, Data Theft appeared first on SecurityWeek.

Protegrity Developer Edition: Free containerized Python package to secure AI pipelines

Protegrity Developer Edition enables developers, data scientists, ML engineers, and security teams an easy way to add data protection into GenAI and unstructured data workflows, without the need for enterprise setup. Billed as the first ...

Automated Vulnerability Scanning To Map Compliance Frameworks

In an era of escalating cyber threats and strict regulatory expectations, your organization must not only secure their systems but also prove they are secure. This is where automated vulnerability scanning becomes invaluable. By continuously ...

4 ways to use time to level up your security monitoring

SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage platforms, even with lower-cost archive tiers, long-term retention at full ...

Passkeys rise, but scams still hit hard in 2025

Americans are dealing with a growing wave of digital scams, and many are losing money in the process. According to the fourth annual Consumer Cyber Readiness Report, nearly half of U.S. adults have been targeted by cyberattacks or scams, and one ...

Apple strengthens storage flexibility with new disk image formats

Apple’s release of macOS 26 Tahoe introduced a new disk image format and updated an older one, both of which are drawing attention from system testers and forensic examiners. Apple Sparse Image Format (ASIF) The Apple Sparse Image Format (ASIF) ...

Secure Email Finder Tools: Ensuring Privacy in 2025

Email finder tools are not all the same. Some focus on speed, while others give more attention to safety and accuracy. The post Secure Email Finder Tools: Ensuring Privacy in 2025 appeared first on Security Boulevard.