Application Security News and Articles


Meeting IEC 62443 Compliance: How CimTrak Secures Industrial Control Systems

The Rising Stakes in Critical Infrastructure Security Cybersecurity has traditionally been framed as an IT issue, protecting desktops, databases, and cloud platforms. But the real frontier is deeper. It's in the industrial systems that power our ...

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

Discover Mend.io’s AI Security Dashboard. The post Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk appeared first on Security Boulevard.

Beyond the Basics Developing a Risk Driven AI Driven Cloud Native Security Strategy

Cloud-native architectures bring speed and scalability but also create new risks beyond traditional workloads. Misconfigured APIs, vulnerable containers, and over-permissive access expose enterprises to advanced threats. This blog explains why ...

Why Threat-Led Defense & Adversary Behavior Are Driving Security Priorities

Security teams used to set priorities based on vulnerabilities and assets. They would monitor CVE feeds, build patch schedules, and measure success by the number of exposures closed. This work is vital to operational security, but it doesn’t ...

Acronis brings patch management to consumer backup software

Acronis announced the general availability of Acronis True Image 2026, the new release of its natively integrated backup and security software for consumers and small businesses. The latest version introduces built-in patch management for Windows ...

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo has raised more than $32 million in total, with the latest funding round led by HV Capital.  The post Mondoo Raises $17.5 Million for Vulnerability Management Platform appeared first on SecurityWeek.

New Smish: New York Department of Revenue

 As I was visiting SmishTank to report the most recent SMish that I had received (an iMessage from a +27 South African telephone number claiming to be from ParkMobile) I noticed there had been many recent submissions from the New York ...

Introducing Resource Policies for Continuous AI Security – FireTail Blog

Sep 30, 2025 - Alan Fagan - AI moves fast. New models are adopted, get updated, configurations drift. Keeping track of it all is hard, and catching security issues before they become incidents can feel impossible.That is why, as part of our ...

CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind

Flynn has been DeepMind’s VP of security since May 2024. Before then he had been a CISO with Amazon, CISO at Uber, and director of information security at Facebook. The post CISO Conversations: John ‘Four’ Flynn, VP of Security at Google ...

New Guidance Calls on OT Operators to Create Continually Updated System Inventory

Agencies in several countries have created guidance titled ‘Creating and Maintaining a Definitive View of Your OT Architecture’. The post New Guidance Calls on OT Operators to Create Continually Updated System Inventory appeared first on ...

Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI

Join Picus Security, SANS, Hacker Valley, and leading CISOs at The BAS Summit 2025 to learn how AI is redefining Breach and Attack Simulation (BAS) and why it’s becoming the new benchmark for cyber resilience. Attend the webinar to: See how AI ...

California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures

The Transparency in Frontier Artificial Intelligence Act (TFAIA) requires AI companies to implement and disclose publicly safety protocols to prevent their most advanced models from being used to cause major harm. The post California Gov. Gavin ...

High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter 

The flaws could allow attackers to escalate privileges, manipulate notifications, and enumerate usernames. The post High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  appeared first on SecurityWeek.

Western Digital My Cloud NAS devices vulnerable to unauthenticated RCE (CVE-2025-30247)

Western Digital has fixed a critical remote code execution vulnerability (CVE-2025-30247) in the firmware powering its My Cloud network-attached storage (NAS) devices, and has urged users to upgrade as soon as possible. About CVE-2025-30247 ...

Details of a Scam

Longtime Crypto-Gram readers know that I collect personal experiences of people being scammed. Here’s an almost: Then he added, “Here at Chase, we’ll never ask for your personal information or passwords.” On the contrary, he gave me more ...

How to Choose the Right VAPT Frequency

Regular Vulnerability Assessment and Penetration Testing (VAPT) is important for businesses to identify and mitigate security risks. Choosing the right frequency depends on your organization’s risk profile, data sensitivity, regulatory ...

Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk

Webinar: How do you embrace AI’s potential while defending against its threats? The post Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk appeared first on SecurityWeek.

Harrods Data Breach Explained

On Friday, September 26–27, 2025 (UK time), Harrods warned that a third-party provider suffered an intrusion that exposed some online customers’ basic personal details (names and contact information). Harrods says its own systems weren’t ...

SAST, DAST ve SCA Taramaları

Yazılım güvenliği artık yalnızca penetrasyon testine bırakılabilecek bir konu değil. Modern yazılım geliştirme yaşam döngüsünde (SDLC)…Continue ...

Apple Updates iOS and macOS to Prevent Malicious Font Attacks

The vulnerability could lead to a denial-of-service condition or memory corruption when a malicious font is processed. The post Apple Updates iOS and macOS to Prevent Malicious Font Attacks appeared first on SecurityWeek.