Application Security News and Articles


When Machines Attack Machines: The New Reality of AI Security

Unlike conventional IT systems—with bounded entry points, predictable patch cycles, and known vulnerabilities—large language models (LLMs) and next-generation AI agents create an attack surface so broad, dynamic, and interconnected that ...

Cisco Firewall, Unified CCX, and ISE Vulnerability Summary (Nov 2025)

CVE-2025-20333 and CVE-2025-20362 Details Cisco disclosed a new active attack variant targeting and exploiting the previously known vulnerabilities in the Cisco Secure Firewall ASA and FTD  software (CVE-2025-20333 and CVE-2025-20362) leading to ...

NDSS 2025 – Detecting IMSI-Catchers By Characterizing Identity Exposing Messages In Cellular Traffic

SESSION Session 3B: Wireless, Cellular & Satellite Security ----------- ----------- Authors, Creators & Presenters: Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni ...

Foundational Flaws: How Simple Security Missteps Cost You

The post Foundational Flaws: How Simple Security Missteps Cost You appeared first on AI Security Automation. The post Foundational Flaws: How Simple Security Missteps Cost You appeared first on Security Boulevard.

Black Friday Bot Warning: The Products to Protect

New intelligence from KasadaIQ and StockX highlights where holiday demand and bot attacks are headed next. Get a quick look at the categories driving shopper frenzy and the defense strategies retailers should prioritize going into Black ...

A Perfect Storm: DDoS Attack Hits Turkish Luxury Retailer During Fall Collection Launch

When high-stakes events meet unprecedented attack volumes, disruption can be devastating. A Turkish luxury retail platform experienced this firsthand when it was hit with a record-breaking application-layer DDoS attack, peaking at 14.2 million ...

Randall Munroe’s XKCD ‘’Shielding Chart”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Shielding Chart” appeared first on Security Boulevard.

Cloudflare to acquire Replicate, aiming for seamless serverless AI at global scale

Cloudflare has agreed to acquire Replicate, an AI platform that makes it easy for developers to deploy and run AI models. This acquisition will accelerate the company’s vision to make Cloudflare Workers the leading end-to-end platform for ...

Shared Intel Q&A: Viewing CMMC as a blueprint for readiness across the defense supply chain

Small and mid-sized contractors play a vital role in the U.S. defense industrial base — but too often, they remain the weakest link in the cybersecurity chain. Related: Pentagon enforcing CMMC RADICL’s  2025 DIB Cybersecurity Maturity Report ...

A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major ...

Your data, your model: Self-serve custom entity types in Tonic Textual

Tonic Textual’s new Custom Entity Types let teams define, train, and deploy entity models on their own data—no data science skills needed. The post Your data, your model: Self-serve custom entity types in Tonic Textual appeared first on ...

NDSS 2025 – Time-Varying Bottleneck Links In LEO Satellite Networks

SESSION Session 3B: Wireless, Cellular & Satellite Security ----------- ----------- Authors, Creators & Presenters: Yangtao Deng (Tsinghua University), Qian Wu (Tsinghua University), Zeqi Lai (Tsinghua University), Chenwei Gu (Tsinghua ...

Logitech confirms data breach

Logitech, the Swiss multinational electronics and technology company best known for marketing computer peripherals and hardware, has suffered a data breach. “While the investigation is ongoing, at this time Logitech believes that the ...

Iranian Hackers Target Defense and Government Officials in Ongoing Campaign

The state-sponsored APT has been targeting the victims’ family members to increase pressure on their targets. The post Iranian Hackers Target Defense and Government Officials in Ongoing Campaign appeared first on SecurityWeek.

Synack unveils Sara Pentest to accelerate scalable AI-driven penetration testing

Synack has announced Sara Pentest, a new agentic AI product built on the Synack Autonomous Red Agent (Sara) architecture. Sara Pentest performs penetration testing on hosts and web applications, speeding up vulnerability detection and remediation ...

Why Context Matters More Than Code in AI-Native Product Development

AI has changed how software gets built. For years, engineering teams treated code as the scarce resource. Writing it took time. Editing it took effort....Read More The post Why Context Matters More Than Code in AI-Native Product Development ...

DoorDash Says Personal Information Stolen in Data Breach

Names, addresses, email addresses, and phone numbers were compromised after an employee fell for a social engineering attack. The post DoorDash Says Personal Information Stolen in Data Breach appeared first on SecurityWeek.

Five men admit helping North Korean IT workers infiltrate US companies

US federal prosecutors have secured guilty pleas from five men who helped North Korean IT workers get hired by companies in the United States. This group of domestic facilitators helped a sanctioned government move money, slip past hiring checks, ...

The internet isn’t free: Shutdowns, surveillance and algorithmic risks

Global internet freedom has declined for the 15th straight year, according to the latest Freedom House report. Out of 72 countries evaluated, 28 recorded declines and 17 saw improvements. Shutdowns hit high-stakes zones The report documents ...