Application Security News and Articles


Extracting the How: Scaling Adversary Procedures Intelligence with AI

Labeling adversary activity with ATT&CK techniques is a tried-and-true method for classifying behavior. But it rarely tells defenders how those behaviors are executed in real environments. The post Extracting the How: Scaling Adversary ...

Verisoul Raises $8.8 Million for Fraud Prevention

The company plans to accelerate product development, scale go-to-market efforts, and hire new talent. The post Verisoul Raises $8.8 Million for Fraud Prevention appeared first on SecurityWeek.

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices. The post Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks appeared ...

European police busts Ukraine scam call centers

Law enforcement agencies from several European countries have arrested twelve persons suspected of being involved in scamming victims across Europe, Eurojust announced today. “The fraudsters used various scams, such as posing as police ...

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026

Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire The post Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 appeared first on Security Boulevard.

Securing the AI Frontier: How API Posture Governance Enables NIST AI RMF Compliance

As organizations accelerate the adoption of Artificial Intelligence, from deploying Large Language Models (LLMs) to integrating autonomous agents and Model Context Protocol (MCP) servers, risk management has transitioned from a theoretical ...

Unified Security for On-Prem, Cloud, and Hybrid Infrastructure: The Seceon Advantage

Breaking Free from Security Silos in the Modern Enterprise Today’s organizations face an unprecedented challenge: securing increasingly complex IT environments that span on-premises data centers, multiple cloud platforms, and hybrid ...

SoundCloud Confirms Security Incident

SoundCloud confirmed today that it experienced a security incident involving unauthorized access to a supporting internal system, resulting in the exposure of certain user data. The company said the incident affected approximately 20 percent of ...

T.H.E. Journal: How Schools Can Reduce Digital Distraction Without Surveillance

This article was originally published in T.H.E. Journal on 12/10/25 by Charlie Sander. Device-based learning is no longer “new,” but many schools still lack a coherent playbook for managing it. Many school districts dashed to adopt 1:1 ...

Chinese Surveillance and AI

New report: “The Party’s AI: How China’s New AI Systems are Reshaping Human Rights.” From a summary article: China is already the world’s largest exporter of AI powered surveillance technology; new surveillance technologies and ...

SoundCloud breached, hit by DoS attacks

Audio streaming service SoundCloud has suffered a breach and has been repeatedly hit by denial of service attacks, the company confirmed on Monday. In the days leading up to the confirmation, users accessing SoundCloud through VPNs reported ...

Australian Privacy Act 1988 (Cth) with 2024 Amendments – Description

What is the Australian Privacy Act? The Australian Privacy Act 1988 (Cth), commonly referred to as the Privacy Act, is the primary legislation governing the protection of personal information in Australia. It establishes how government agencies ...

JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover

The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges. The post JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover appeared first on SecurityWeek.

7 Mobile Cybersecurity Trends Approov Forecast for 2025 — And the Results Are In

Here at Approov, we always like to look ahead and try to predict what will happen in mobile cybersecurity in the coming year. Mobile app security is an issue which must be taken seriously, and having some insight into key trends is important, in ...

What You Should Know Before Migrating Your App to Ruby on Rails: Key Insights for a Smooth Transition

Learn key insights, risks, and best practices before migrating your app to Ruby on Rails for a smooth, secure, and scalable transition. The post What You Should Know Before Migrating Your App to Ruby on Rails: Key Insights for a Smooth Transition ...

Post-Quantum Cryptography (PQC): Application Security Migration Guide

The coming shift to Post-Quantum Cryptography (PQC) is not a distant, abstract threat—it is the single largest, most complex cryptographic migration in the history of cybersecurity. Major breakthroughs are being made with the technology. Google ...

User Data Compromised in SoundCloud Hack 

SoundCloud said the information of 20% of users was accessed by hackers who breached its systems. The post User Data Compromised in SoundCloud Hack  appeared first on SecurityWeek.

In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

Threat actors are exploiting the two critical authentication bypass vulnerabilities against FortiGate appliances. The post In-the-Wild Exploitation of Fresh Fortinet Flaws Begins appeared first on SecurityWeek.

Why We’ll Never Patch Everything, and That’s Okay 

Why fixing every vulnerability is impossible—and unnecessary. Learn how risk-based vulnerability management prioritizes what to patch, what to defer, and why context matters more than CVSS. The post Why We’ll Never Patch ...

The messy data trails of telehealth are becoming a security nightmare

In this Help Net Security interview, Scott Bachand, CIO/CISO at Ro, discusses how telehealth reshapes the flow of patient data and what that means for security. He explains why organizations must strengthen data classification and visibility as ...