Application Security News and Articles


U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam

The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, ...

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks

Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams to detect, triage, and take down brand and executive threats across social media and the open, deep, and ...

New Jscrambler AI Assistant accelerates PCI DSS compliance decisions

Jscrambler announced the AI Assistant for PCI DSS script authorization workflows, which delivers context-rich insights and expert recommendations to enable prompt and confident script authorization decisions and justifications. PCI DSS v4 ...

A Look at AI: Black Hat 2025 Revealed Concerns & Spotlighted Opportunities  

At Black Hat 2025, AI dominated the spotlight—showcasing new cybersecurity innovations, NHI risks, and the urgent need for identity-aware AI security. The post A Look at AI: Black Hat 2025 Revealed Concerns & Spotlighted Opportunities   ...

A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin University has developed a way to make that easier. Their work introduces a container-based ...

Using Digital Twins to Model Cyber Risk: BS or BFF?

Digital twins are redefining cybersecurity by modeling real-time risk, unifying siloed data, and helping teams predict and prevent attacks before they happen. The post Using Digital Twins to Model Cyber Risk: BS or BFF? appeared first on Security ...

Maltrail: Open-source malicious traffic detection system

Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists, as well as static lists compiled from antivirus reports and ...

Building trust in AI-powered security operations

In this Help Net Security video, James Hodge, VP, Global Specialist Organisation at Splunk, explores the transformative role of AI in cybersecurity threat detection. He explains how AI’s ability to process vast amounts of data and detect ...

The diagnosis is in: Mobile health apps are bad for your privacy

Sensitive data is moving through Android healthcare apps without adequate protection. Researchers found that many transmit information without encryption, store files without safeguards, or share it through third-party components. Study design ...

Adobe Patches Critical Vulnerability in Connect Collaboration Suite

Adobe has published a dozen security advisories detailing over 35 vulnerabilities across its product portfolio. The post Adobe Patches Critical Vulnerability in Connect Collaboration Suite appeared first on SecurityWeek.

Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws

The tech giant has rolled out fixes for 173 CVEs, including five critical-severity security defects. The post Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws appeared first on SecurityWeek.

The power grid is getting old, and so is the cybersecurity protecting it

Critical infrastructure is getting older, and the cost of that decay is starting to show. The Arthur D. Little Built to Last? report says that the systems powering energy, water, and transport are reaching the end of their design life. Old ...

The 8 Most Dangerous File Types for Malware Infections

The post The 8 Most Dangerous File Types for Malware Infections appeared first on Votiro. The post The 8 Most Dangerous File Types for Malware Infections appeared first on Security Boulevard.

Risk-Based Vulnerability Management: Prioritize What Actually Matters

The post Risk-Based Vulnerability Management: Prioritize What Actually Matters appeared first on AI Security Automation. The post Risk-Based Vulnerability Management: Prioritize What Actually Matters appeared first on Security Boulevard.

The LLM Dependency Trap

Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems in a fraction of the time it used to take. The post The LLM ...

Aembit Connects AI and Workload Access to AWS Secrets Manager

4 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management. The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared ...

NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3

Author, Creator & Presenter: Keynote2: Frederik Braun (Mozilla) Session 3: Web3 and Work in Progress: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security ...

Beyond Alerts: Building Smarter, Context-Aware Threat Detection

Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises defend against modern cyber threats. Reed, who joined Vectra after years leading ...

Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)

7Critical 158Important 2Moderate 0Low Microsoft addresses 167 CVEs in its largest Patch Tuesday to date, including three zero-day vulnerabilities, two of which were exploited in the wild. Microsoft patched 167 CVEs in its October 2025 Patch ...

Preparing for the Next Wave of AI-Driven Threats

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal parts technical and creative—describing ...