Application Security News and Articles


SonicWall Flags Old Vulnerability as Actively Exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild. The post SonicWall Flags Old Vulnerability as Actively Exploited appeared first on SecurityWeek.

MITRE Hackers’ Backdoor Has Targeted Windows for Years

Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years. The post MITRE Hackers’ Backdoor Has Targeted Windows for Years appeared first on SecurityWeek.

Apple plugs zero-days holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)

Apple has released emergency security updates for iOS/iPadOS, macOS, tvOS and visionOS that fix two zero-day vulnerabilities (CVE-2025-31200, CVE-2025-31201) that have been exploited “in an extremely sophisticated attack against specific ...

Cyber threats against energy sector surge as global tensions mount

Cyberattacks targeting the energy sector are increasing, driven by a host of geopolitical and technological factors. A report published by Sophos in July 2024, and which surveyed 275 cybersecurity and IT leaders from the energy, oil/gas, and ...

Gurucul introduces self-driving SIEM powered by AI enhancements

Gurucul announced a quantum leap forward with a self-driving SIEM powered by extensive AI enhancements and infused within a revamped AI-centric user interface for improved and effective execution of collect, detect, investigate, threat hunt and ...

Trump’s Retaliation Against Chris Krebs — and the Cybersecurity Industry’s Deafening Silence

Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), was fired by Donald Trump in 2020 for publicly affirming that the presidential election was secure and free from widespread fraud. Fast-forward to ...

Symbiotic Security v1 empowers developers to write secure code

Symbiotic Security launched Symbiotic Security version 1 that ensures code security keeps pace with development speed, by using AI to secure code in real-time through remediation and training integrated within their workflows. Symbiotic Security ...

Ebryx LLMSec protects LLMs and autonomous AI agents in production environments

Ebryx launched LLMSec — a suite of specialized security services designed to protect Large Language Models (LLMs) and autonomous AI agents in production environments. The new risk landscape for AI builders From OpenAI-based copilots to ...

When AI agents go rogue, the fallout hits the enterprise

In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated into real-world systems. Issues like hallucinations, prompt injections, and embedded biases can turn these systems ...

Microsoft vulnerabilities: What’s improved, what’s at risk

Microsoft reported a record 1,360 vulnerabilities in 2024, according to the latest BeyondTrust Microsoft Vulnerabilities Report. The volume marks an 11% increase from the previous record in 2022 and fits within a broader post-pandemic trend: more ...

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies The post Exploiting SMS: Threat Actors Use Social Engineering to Target Companies appeared first on Security Boulevard.

Inside PlugValley: How this AI vishing-as-a-service group operates

In this Help Net Security video, Alexis Ober, Threat Intel Analyst at Fortra, discusses the threat actor group PlugValley, which is now offering AI-powered vishing-as-a-service. Rather than requiring technical skills or large budgets, ...

Review: Hands-On Industrial Internet of Things

Hands-On Industrial Internet of Things is a practical guide designed specifically for professionals building and securing industrial IoT (IIoT) systems. About the authors Giacomo Veneri brings deep expertise in telecommunications and AI, shaped ...

From maintenance to innovation: The cultural impact of managed secrets

How modern secrets management shapes culture, reduces friction, and clears the way for developer innovation The post From maintenance to innovation: The cultural impact of managed secrets appeared first on Security Boulevard.

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection. The post MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection appeared first on Security Boulevard.

From PyPI to the Dark Marketplace: How a Malicious Package Fuels the Sale of Telegram Identities

Introduction In today’s digital era, security breaches can occur in the blink of an eye. Telegram Desktop is renowned for its secure, user-friendly messaging interface, but what if the data used to provide seamless experience could also be your ...

Krebs Exits SentinelOne After Security Clearance Pulled

Chris Krebs has resigned from SentinelOne after security clearance withdrawn and an order to review CISA’s conduct under his leadership. The post Krebs Exits SentinelOne After Security Clearance Pulled appeared first on SecurityWeek.

Whistleblower: Musk’s DOGE Stole Data, Caused Breach at U.S. Agency

A whistleblower in the NLRB said in sworn testimony that staffers within the Musk-led DOGE group breached agency systems, exfiltrated sensitive data, and used tools and techniques similar to those wielded by cybercriminals to hide their ...

AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale

Slash SOC response times from hours to minutes with Morpheus AI—register for our live AI workshop on May 7 to transform your Tier 1/2 operations. The post AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale appeared first on D3 ...

Vector and Embedding Weaknesses in AI Systems

Learn how to secure embeddings against poisoning, leakage, and inversion attacks. The post Vector and Embedding Weaknesses in AI Systems appeared first on Security Boulevard.