Application Security News and Articles


Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Paris, France, 13th June 2025, CyberNewsWire The post Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale appeared first on Security Boulevard.

Identiverse 2025: Trust, Delegation, and the Era of Continuous Identity

Identiverse 2025 exposed the urgent need for NHI governance. From AI agents to orphaned credentials, NHIs and their sprawling secrets are today’s most overlooked risks. The post Identiverse 2025: Trust, Delegation, and the Era of Continuous ...

Third-Party Cyber Risk Management Platforms: The Definitive Guide

Introduction to Third-Party Cyber Risk Management Platforms Third-party cyber risk management (TPRM) represents the systematic approach organizations use to assess, monitor, and mitigate cybersecurity risks posed by external vendors, suppliers, ...

Cybersecurity Snapshot: NIST Offers Zero Trust Implementation Advice, While OpenAI Shares ChatGPT Misuse Incidents

Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about their exposure management experiences. And ...

Cybersecurity Insights with Contrast CISO David Lindner | 06/13/25

Insight No. 1 — The great CISO exodus: Why your top defenders are planning a silent escape What happens when your most critical security minds are quietly planning their exit? With 53% of cyber leaders exploring new roles, the cybersecurity ...

TeamFiltration Abused in Entra ID Account Takeover Campaign

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts. The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday. The ...

Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Industry professionals comment on the Trump administration’s new executive order on cybersecurity.  The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.

Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business Following the Latest Outage

Discover the capabilities of Microsoft 365 Data Loss Prevention (DLP) and understand its limitations. Learn how to prevent unauthorized data access and sharing. The post Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business ...

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers. The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.

Fog Ransomware Attack Employs Unusual Tools

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41. The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.

How to Reduce PR Merge Time from 14 Days to Under a Day? | Panto AI

Imagine engineers finishing a new feature, only to see it sit idle in a pull request (PR) queue for days or even weeks. This delay is not…Continue reading on Medium »

[Webinar] Securing AI-driven applications with DAST

Join us for a live webinar with application security experts and Escape clients - Seth Kirschner (DoubleVerify), Nathan Byrd (Applied Systems), Nick Semyonov (PandaDoc), as they break down how their teams are rethinking testing strategies to keep ...

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication. The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek.

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption

Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution. The post Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption appeared first on SecurityWeek.

StackHawk Sensitive Data Identification provides visibility into high-risk APIs

StackHawk announced Sensitive Data Identification to give security teams visibility into high-risk APIs across thousands of code repositories within an organization. With most security teams only aware of approximately 10% of their API attack ...

SAML vs. OAuth 2.0: Mastering the Key Differences

Imagine this: It’s Monday morning. You grab your coffee, sit down at your desk, and open up your computer. First, you log into your email. Then, your project management tool… Before you’ve even tackled your first task, you’ve navigated a ...

ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs. The post ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions appeared first on SecurityWeek.

Unpacking the security complexity of no-code development platforms

In this Help Net Security interview, Amichai Shulman, CTO at Nokod Security, discusses how the abstraction layer in no-code environments complicates security by obscuring data flow, identity propagation, and control logic. Shulman also addresses ...

What CISOs need to know about agentic AI

GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize, write, and respond. But something new is gaining ground: agentic AI. These systems don’t just answer questions. They make ...