Application Security News and Articles


NDSS 2025 – KernelSnitch: Side Channel-Attacks On Kernel Data Structures

Session 5D: Side Channels 1 Authors, Creators & Presenters: Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer (Graz University of Technology), Daniel Gruss (Graz University of ...

What Tech Leaders Need to Know About MCP Authentication in 2025

MCP is transforming AI agent connectivity, but authentication is the critical gap. Learn about Shadow IT risks, enterprise requirements, and solutions. The post What Tech Leaders Need to Know About MCP Authentication in 2025 appeared first on ...

Microsoft Expands its Bug Bounty Program to Include Third-Party Code

In a nod to the evolving threat landscape that comes with cloud computing and AI and the growing supply chain threats, Microsoft is broadening its bug bounty program to reward researchers who uncover threats to its users that come from ...

Funding of Israeli Cybersecurity Soars to Record Levels 

Israeli cybersecurity firms raised $4.4B in 2025 as funding rounds jumped 46%. Record seed and Series A activity signals a maturing, globally dominant cyber ecosystem. The post Funding of Israeli Cybersecurity Soars to Record Levels  appeared ...

As Capabilities Advance Quickly OpenAI Warns of High Cybersecurity Risk of Future AI Models  

OpenAI warns that frontier AI models could escalate cyber threats, including zero-day exploits. Defense-in-depth, monitoring, and AI security by design are now essential. The post As Capabilities Advance Quickly OpenAI Warns of High Cybersecurity ...

LW ROUNDTABLE Part 2: Mandates surge, guardrails lag — intel from the messy middle

Regulators made their move in 2025. Disclosure deadlines arrived. AI rules took shape. Liability rose up the chain of command. But for security teams on the ground, the distance between policy and practice only grew wider. Part two of a … ...

Three New React Vulnerabilities Surface on the Heels of React2Shell

CVE-2025-55183, CVE-2025-55184, and CVE-2025-67779 require immediate attention The post Three New React Vulnerabilities Surface on the Heels of React2Shell appeared first on Security Boulevard.

Prompt Injection Can’t Be Fully Mitigated, NCSC Says Reduce Impact Instead 

The NCSC warns prompt injection is fundamentally different from SQL injection. Organizations must shift from prevention to impact reduction and defense-in-depth for LLM security. The post Prompt Injection Can’t Be Fully Mitigated, NCSC Says ...

Cyber Risk is Business Risk: Embedding Resilience into Corporate Strategy 

To transform cyber risk into economic advantage, leaders must treat cyber as a board-level business risk and rehearse cross-border incidents with partners to build trust.  The post Cyber Risk is Business Risk: Embedding Resilience into ...

Randall Munroe’s XKCD ‘EPIRBS’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘EPIRBS’ appeared first on Security Boulevard.

TDL 011 | The Hidden Layer of Cybersecurity: Andreas Taudte on DNS & DDI Defense

Summary This episode of the Defenders Log features host David Redekop and guest Andreas Taudte discussing the often-overlooked world of DDI (DNS, DHCP, and IP Address Management) and its critical role in network security. Taudte defines DDI and ...

React Fixes Two New RSC Flaws as Security Teams Deal with React2Shell

As they work to fend off the rapidly expanding number of attempts by threat actors to exploit the dangerous React2Shell vulnerability, security teams are learning of two new flaws in React Server Components that could lead to denial-of-service ...

In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy

Other noteworthy stories that might have slipped under the radar: Pentagon orders accelerated move to PQC, US shuts down scheme to smuggle GPUs to China, DroidLock Android ransomware. The post In Other News: PromptPwnd Attack, Small macOS ...

Gladinet CentreStack Flaw Exploited to Hack Organizations

Threat actors have hacked at least nine organizations by exploiting the recently patched Gladinet CentreStack flaw. The post Gladinet CentreStack Flaw Exploited to Hack Organizations appeared first on SecurityWeek.

ImmuniWeb enhances AI vulnerability testing and compliance reporting

ImmuniWeb has unveiled a major update to its ImmuniWeb AI Platform, based on ongoing research as well as valuable feedback from customers and partners in over 50 countries. This cumulative Q4 update builds on the Q3 update announced in early ...

Fieldtex Data Breach Impacts 238,000

The Akira ransomware group took credit for the Fieldtex Products hack in November, claiming to have stolen 14 Gb of data. The post Fieldtex Data Breach Impacts 238,000 appeared first on SecurityWeek.

Recent GeoServer Vulnerability Exploited in Attacks

Because user input is not sufficiently sanitized, attackers could exploit the flaw to define external entities within an XML request. The post Recent GeoServer Vulnerability Exploited in Attacks appeared first on SecurityWeek.

Building Trustworthy AI Agents

The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven’t made trustworthy. We can’t. And today’s versions are failing us in predictable ways: pushing us to do things against our own best ...

MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities

XSS remains the top software weakness, followed by SQL injection and CSRF. Buffer overflow issues and improper access control make it to top 25. The post MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities appeared first on ...

3 Compliance Processes to Automate in 2026

For years, compliance has been one of the most resource-intensive responsibilities for cybersecurity teams. Despite growing investments in tools, the day-to-day reality of compliance is still dominated by manual, duplicative tasks. Teams chase ...