Application Security News and Articles


Ivanti upgrades Connect Secure with hardened system and gateway improvements

Ivanti released Ivanti Connect Secure (ICS) version 25.X. The update includes a modernized enterprise-grade OS, platform hardening, and gateway enhancements designed to reduce vulnerabilities, shrink attack surfaces, and improve resilience. ...

Legit’s Command Center tracks AI code, models, and MCP server usage across the SDLC

Legit Security has updated its AI Security Command Center. As vibe coding and AI-first development reshape how software is built, the Command Center offers visibility into when, where, and how AI-generated code, AI models, and MCP servers are ...

Let’s Understand If Your Code Reviews Are Helping or Hurting.

Executive summary: In healthy teams, reviews spread context, catch defects early, and keep risk low.Continue reading on Medium »

Cyberattack on Beer Giant Asahi Disrupts Production 

The incident has resulted in a system failure that impacted orders and shipments in Japan, and call center operations. The post Cyberattack on Beer Giant Asahi Disrupts Production  appeared first on SecurityWeek.

The Reality of CTI: Voices from the Analysts

How CTI Analysts See Their Role, Challenges, and Future The post The Reality of CTI: Voices from the Analysts appeared first on Security Boulevard.

Organizations Warned of Exploited Sudo Vulnerability

The vulnerability could allow local, low-privileged attackers to execute commands with root privileges, leading to full system compromise. The post Organizations Warned of Exploited Sudo Vulnerability appeared first on SecurityWeek.

DataDome’s 2025 Global Bot Security Report Exposes the AI Traffic Crisis

Legacy defenses collapsing as AI-driven traffic reshapes the web; only 2.8% of 16,900+ domains fully protected The post DataDome’s 2025 Global Bot Security Report Exposes the AI Traffic Crisis appeared first on Security Boulevard.

The Web’s Bot Problem Isn’t Getting Better: Insights From the 2025 Global Bot Security Report

Over 60% of websites remain unprotected against basic bots in 2025. Explore key findings from DataDome’s Global Bot Security Report to see how LLM crawlers and sophisticated automation are reshaping online threat landscapes and what businesses ...

As Hardware, API and Network Vulnerabilities Rise, Defenders Rethink Strategies  

Bugcrowd’s latest research reveals a surge in hardware, API, and network vulnerabilities, fueled in part by the rapid adoption of AI-assisted development. Critical flaws and broken access control remain top concerns, while experts warn that ...

Fraudulent email domain tracker: September 2025

This is the sixth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in August's report, our goal is to equip security and anti-fraud teams with greater visibility into the email infrastructure ...

The hidden risks inside open-source code

Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps businesses connected. For many security leaders, it is simply part of the environment, not something they think about every ...

Risk of Prompt Injection in LLM-Integrated Apps

Large Language Models (LLMs) are at the core of today’s AI revolution, powering advanced tools and other intelligent chatbots. These sophisticated neural networks are trained on vast amounts of text data, enabling them to understand context, ...

Cyber risk quantification helps CISOs secure executive support

In this Help Net Security interview, Vivien Bilquez, Global Head of Cyber Resilience at Zurich Resilience Solutions, discusses how organizations are rethinking cyber resilience. He talks about the priorities CISOs should focus on and the risks ...

Your budget Android phone might be spying on you

Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike apps from the Google Play Store, many of these are not subject to thorough checks and can serve as vectors ...

Keeping the internet afloat: How to protect the global cable network

The resilience of the world’s submarine cable network is under new pressure from geopolitical tensions, supply chain risks, and slow repair processes. A new report from the Center for Cybersecurity Policy and Law outlines how governments and ...

Cybersecurity jobs available right now: September 30, 2025

The post Cybersecurity jobs available right now: September 30, 2025 appeared first on Help Net Security.

The Cybersecurity Information Sharing Act Faces Expiration

The CISA is set to expire on September 30, 2025, raising urgent questions about risk, politics, and the future of threat intelligence. The post The Cybersecurity Information Sharing Act Faces Expiration appeared first on SecurityWeek.

Case Study: Penetration Testing for a Technology-Focused Environmental Solutions Provider

Overview The client is a technology-driven provider of environmental monitoring solutions, focused on developing analytical tools used in industrial settings. Their product portfolio includes both mobile and stationary devices designed to support ...

New Splunk 10 Feature – Effective Configuration

One of the Splunk 10 features I’m most excited about is the “Effective Configuration” dashboard.  In this blog post, I’ll explore why this might be my favorite new Splunk 10 feature so far! The Need You likely have a number (potentially, ...

10 Essential Elements of an Effective Dynamic Risk Assessment

Key Takeaways Risk is a moving picture. As organizations grow more digital, interconnected, and regulated, risks evolve. A vendor that looked safe yesterday may be compromised today. A control that passed an audit last quarter might already be ...