Application Security News and Articles


Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras

Production line monitoring cameras made by Inaba can be hacked for surveillance and sabotage, but they remain unpatched. The post Vulnerabilities Allow Remote Hacking of Inaba Plant Monitoring Cameras appeared first on SecurityWeek.

CodeQLEAKED – Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL

A potential supply chain attack on GitHub CodeQL started simply: a publicly exposed secret, valid for 1.022 seconds at a time. In that second, an attacker could take a series of steps that would allow them to execute code within a GitHub Actions ...

Setting-Up Git for performing SAST

Creating and setting-up GitHub repository to perform automated Source Code Scans referred to as SAST(Static Application Security Testing).Continue reading on Medium »

SplxAI raises $7 million to provide security for agentic AI

SplxAI has closed $7 million in seed funding led by LAUNCHub Ventures with participation from Rain Capital, Inovo, Runtime Ventures, DNV Ventures and South Central Ventures. LAUNCHub General Partner Stan Sirakov is also joining the SplxAI Board ...

Malware found on npm infecting local package with reverse shell

Unlike some other public repositories, the npm package repository is never really quiet. And, while there has been some decline in malware numbers between 2023 and 2024, this year's numbers don’t seem to continue that downward trend. Still, ...

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

The United Kingdom’s National Cyber Security Centre (NCSC) has just released updated guidance on migrating to post-quantum cryptography (PQC) to help the nation prepare for developing threats posed by advances in quantum computing. Titled ...

macOS Users Warned of New Versions of ReaderUpdate Malware

macOS users are targeted with multiple versions of the ReaderUpdate malware written in Crystal, Nim, Rust, and Go programming languages. The post macOS Users Warned of New Versions of ReaderUpdate Malware appeared first on SecurityWeek.

AI Agents and API Security: The Hidden Risks Lurking in Your Business Logic

Modern organizations are becoming increasingly reliant on agentic AI, and for good reason: AI agents can dramatically improve efficiency and automate mission-critical functions like customer support, sales, operations, and even security. However, ...

Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)

Google is in the process of rolling out Chrome v134.0.6998.178 to Windows users to fix CVE-2025-2783, a zero-day vulnerability that allowed attackers to to bypass Chrome sandbox protections. The vulnerability was flagged by Kaspersky researchers, ...

Critical Next.js Vulnerability in Hacker Crosshairs

Threat actors have started probing servers impacted by a critical-severity vulnerability in the web application development framework Next.js. The post Critical Next.js Vulnerability in Hacker Crosshairs appeared first on SecurityWeek.

Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack

Despite Oracle categorically denying that its Cloud systems have been breached, sample data released by the hacker seems to prove otherwise. The post Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack appeared first on SecurityWeek.

AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection?

AI allows cybercriminals to circumvent traditional detection systems, and they continue to develop sophisticated methods to enable this. The post AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection? appeared first on Security ...

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority

It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses ...

Sumsub launches Reusable Digital Identity product suite

Sumsub is launching its Reusable Digital Identity product suite. It will mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings ...

Chainguard VMs reduces risk and engineering complexity

Chainguard announced Chainguard VMs, a new product line offering minimal, zero-CVE virtual machine images built entirely from source. Purpose-built for modern, ephemeral workloads in the cloud, Chainguard VMs represent a stark contrast to the ...

Cycode Expands Complete ASPM to Secure Non-human Identities (NHIs)

Inventory, classify, and correlate NHIs with Cycode's leading secrets engine to identify, prioritize, and fix the NHI risks that matter faster. The post Cycode Expands Complete ASPM to Secure Non-human Identities (NHIs) appeared first on ...

BrowserStack Private Devices helps organizations comply with stringent security requirements

BrowserStack launched Private Devices, expanding its enterprise portfolio to address the specialized testing needs of organizations with stringent security requirements. Private Devices offers exclusive access to customized real devices housed in ...

Cyberhaven enhances Linea AI platform to improve data security

Cyberhaven announced a major enhancement to its Linea AI platform with the introduction of advanced content understanding capabilities powered by frontier AI models. This enables Linea AI to intelligently analyze and contextualize all forms of ...

A CISO’s guide to securing AI models

In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT applications, which rely on predefined rules and static algorithms, ML ...

Malwoverview: First response tool for threat hunting

Malwoverview is an open-source threat hunting tool designed for the initial triage of malware samples, URLs, IP addresses, domains, malware families, IOCs, and hashes. “Malwoverview is simple and direct, integrating multiple public ...