Application Security News and Articles


Keeping NHIs Safe from Unauthorized Access

How Do We Keep Non-Human Identities Safe from Unauthorized Access? Understanding Non-Human Identities (NHIs) is crucial. With the rise of cloud computing, the management of machine identities has become a central element of a robust security ...

Stay Reassured with Consistent NHI Security Updates

The Crucial Role of Non-Human Identity Security in Today’s Cloud Environments Why are organizations increasingly focusing on the security of Non-Human Identities (NHIs) within their cybersecurity strategies? Where industries like financial ...

From Bots to Buyers: With Agentic AI, Bot Management Becomes Core Infrastructure

AI agents are reshaping online retail. Discover why bot management is essential infrastructure to control agentic commerce and drive growth. The post From Bots to Buyers: With Agentic AI, Bot Management Becomes Core Infrastructure appeared first ...

Emulating the Espionage-Oriented Group SideWinder

AttackIQ has released a new attack graph that emulates the behaviors exhibited by SideWinder, a threat actor with a long history of cyber espionage dating back to 2012. The group has primarily targeted government, military, and maritime sectors ...

Why AI Red Teaming is different from traditional security

“72% of organizations use AI in business functions — but only 13% feel ready to secure it.” That gap, between adoption and preparedness, explains why traditional AppSec approaches aren’t enough.  Modern AI systems aren’t just software ...

NDSS 2025 – Incorporating Gradients To Rules

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: ingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI (Zhejiang University), R. Sekar (Stony ...

HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale

The New HPE Networking: Integration Complete At Security Field Day, Hewlett Packard Enterprise showcased the results of its most ambitious integration effort: combining decades of networking expertise under a single, AI-driven security vision. ...

The 2025 Healthcare Cyber Crisis: Unified AI Defense Against $10.3M Breaches

The U.S. healthcare system has entered its most dangerous cyber era.As digital transformation reshapes patient care, cloud infrastructure, IoT/IoMT ecosystems, and interconnected provider networks, the sector has simultaneously become the #1 most ...

Navigating Fraud in Customer Verification and Real-Time Payments

As technology continues to rapidly advance (i.e. generative AI, large language models, quantum computing, etc.), financial institutions (FIs) must evolve while balancing opportunity and risk. FIs are embracing advanced technology to meet rising ...

Crypto Exchanges Hacked Again – for Over $100 Million

  Cybercriminals continue to target the cryptocurrency industry, this time with an exploit that affected the Balancer decentralized finance platform, with total losses exceeding $100 million and involving several exchanges that use the ...

Free ServiceNow Agentic AI Security Assessment | AppOmni

Assess your ServiceNow SaaS for Agentic AI and identity risks. Get a detailed report on vulnerabilities and compliance gaps. The post Free ServiceNow Agentic AI Security Assessment | AppOmni appeared first on AppOmni. The post Free ...

Fake spam filter alerts are hitting inboxes

A new phishing campaign is attempting to trick users into believing they’ve missed important emails, security researchers are warning. The emails The bogus email alerts look like they are coming from the recipient’s email domain, and ...

Sleepers Awake!

Here at ColorTokens, most CISOs we speak with understand the need to stop lateral movement attacks. They know that they will inevitably have an initial compromise at some point, for the simple reason that when it comes to perimeter security, the ...

NDSS 2025 – Power-Related Side-Channel Attacks Using The Android Sensor Framework

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar (Graz University of Technology), Andreas Kogler ...

ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure

A researcher found a way to exploit an SSRF vulnerability related to custom GPTs to obtain an Azure access token.  The post ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure appeared first on SecurityWeek.

1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

An individual believed to have been involved in the operation of VenomRAT was arrested recently in Greece. The post 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium appeared first on SecurityWeek.

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Federal agencies have reported as ‘patched’ ASA or FTD devices running software versions vulnerable to attacks. The post CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks appeared first on SecurityWeek.

Metrics Every CISO Needs for Threat-Led Defense Success

Security leaders are under increasing pressure to prove that their defenses actually work. Board members and stakeholders want to see measurable progress, yet most metrics available to CISOs today don’t quite fit that need.  The post Metrics ...

“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again)

CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls. “In CISA’s analysis of agency-reported ...

Webinar Today: The Future of Industrial Network Security

Join us as speakers from Cisco outline important steps industrial organizations can take to safeguard operations, achieve compliance, and enable sustainable growth. The post Webinar Today: The Future of Industrial Network Security appeared ...