Application Security News and Articles


Hacker Conversations: Alex Hall, One-time Fraudster

A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter. The post Hacker Conversations: Alex Hall, One-time Fraudster appeared first on ...

New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek.

How Passkeys Work (Explained Simply)

Introduction Let’s be honest — passwords are a pain. They’re either too simple and easy to guess, or so complicated […] The post How Passkeys Work (Explained Simply) appeared first on Security Boulevard.

MSP Automation Isn’t Optional, But it Isn’t the Answer to Everything

Raise your hand if you’ve fallen victim to a vendor-led conversation around their latest AI-driven platform over the past calendar year. Keep it up if the pitch leaned on “next-gen,” “market-shaping,” or “best-in-class” while they ...

Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking

Cybersecurity has always evolved in response to attacker innovation, but the pace of change over the last few years has been unprecedented—particularly with the emergence of weaponized AI to scale phishing, deepfakes, and voice cloning. As we ...

Adaptive Security Raises $81 Million in Series B Funding

Led by Bain Capital Ventures, the investment round brings the total raised by the company to $146.5 million. The post Adaptive Security Raises $81 Million in Series B Funding appeared first on SecurityWeek.

New Feature | Spamhaus Reputation Checker: Troubleshoot your listing

It’s not always immediately clear why your IP has been listed or how to fix it. To help, we’ve added a new “troubleshooting” step to the IP & Domain Reputation Checker, specifically for those whose IPs have been listed on the Combined ...

GhostPoster Firefox Extensions Hide Malware in Icons

The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek.

Security by Design: Why Multi-Factor Authentication Matters More Than Ever

In an era marked by escalating cyber threats and evolving risk landscapes, organisations face mounting pressure to strengthen their security posture whilst maintaining seamless user experiences. At Thales, we recognise that robust security must ...

SHARED INTEL Q&A: This is how ‘edge AI’ is forcing a rethink of trust, security and resilience

A seismic shift in digital systems is underway — and most people are missing it. Related: Edge AI at the chip layer While generative AI demos and LLM hype steal the spotlight, enterprise infrastructure is being quietly re-architected, not from ...

IP Blacklist Check: How to Recover and Prevent Blacklisted IP Addresses

Originally published at IP Blacklist Check: How to Recover and Prevent Blacklisted IP Addresses by EasyDMARC. When your emails suddenly stop reaching inboxes, one ... The post IP Blacklist Check: How to Recover and Prevent Blacklisted IP ...

Auto Parts Giant LKQ Confirms Oracle EBS Breach

LKQ said the personal information of thousands of individuals was compromised as a result of the hacker attack. The post Auto Parts Giant LKQ Confirms Oracle EBS Breach appeared first on SecurityWeek.

Trellix advances NDR to close the OT-IT threat detection-to-response gap

Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation and response to reduce the threat detection-to-response ...

XM Cyber bridges external attack surface management with validated internal attack paths

XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the gap between what’s exposed outside and what exists inside. By bridging these two worlds, XM Cyber now ...

Hadrian launches offensive agentic AI to expose vulnerabilities before attackers

Hadrian launched the latest iteration of its offensive Agentic AI Platform, designed to take an offensive approach to find external exposures and test them for exploitability. Instead of waiting for attacks to happen, Hadrian’s AI agents act ...

Vectra AI redefines hybrid resilience across the attack lifecycle

Vectra AI redefines hybrid attack resilience across the full attack lifecycle by unifying controls pre-and-post compromise within the Vectra AI Platform. Vectra AI’s control philosophy empowers defenders with continuous control through ...

Securing the AI Revolution: NSFOCUS LLM Security Protection Solution

As Artificial Intelligence technology rapidly advances, Large Language Models (LLMs) are being widely adopted across countless domains. However, with this growth comes a critical challenge: LLM security issues are becoming increasingly prominent, ...

Dux Emerges From Stealth Mode With $9 Million in Funding

The startup takes an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets. The post Dux Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek.

Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those reports arrive and explains why remediation so often ...

The Rise of Precision Botnets in DDoS

For a long time, DDoS attacks were easy to recognize. They were loud, messy, and built on raw throughput. Attackers controlled massive botnets and flooded targets until bandwidth or infrastructure collapsed. It was mostly a scale problem, not an ...