Application Security News and Articles


Achieving Liberating Flexibility with Cloud NHIs

Can Flexible Security Be Achieved with Cloud NHIs? Organizations are increasingly relying on the cloud for operational efficiency and scalability. But how can businesses ensure their cloud environments remain secure without sacrificing ...

Satisfied with Your Cloud Security? Enhance with NHIs

What Are Non-Human Identities and Why Are They Critical for Cloud Security? Have you ever considered how Non-Human Identities (NHIs) are transforming cloud security? With technological advancements ushering in a digital transformation across ...

NDSS 2025 – SCAMMAGNIFIER: Piercing The Veil Of Fraudulent Shopping Website Campaigns

SESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State University), Zhuoer Lyu (Arizona State University), Adam Oest (Amazon), Dhruv Kuchhal ...

Randall Munroe’s XKCD ‘’Planetary Rings”

via the cosmic humor & dry-as-interstellar-space wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Planetary Rings” appeared first on Security Boulevard.

Spektrum Labs Previews Cryptographic Platform for Proving Cyber Resilience

Spektrum Labs is providing early access to a platform that enables cybersecurity and IT teams to mathematically prove they have achieved cyber resilience. Company CEO J.J. Thompson said the Spektrum Fusion platform makes use of cryptographic ...

Fortinet’s Fabric-Based Approach to Cloud Security

The enterprise migration to the cloud has created a security paradox. While digital transformation and multi-cloud architectures promise agility, they have also delivered unprecedented complexity. This complexity is the modern CISO’s ...

In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Other noteworthy stories that might have slipped under the radar: rogue ransomware negotiators charged, F5 hack prompts OT security guidance, Germany targets Huawei tech. The post In Other News: Controversial Ransomware Report, Gootloader ...

Cisco Unified CCX Remote Code Execution Vulnerabilities (CVE-2025-20354, CVE-2025-20358)

Technical details The problem comes from weak authentication in two different CCX components. CVE-2025-20354 targets the Java RMI service. CCX exposes this service to accept remote data, but it does not properly check who is sending it. That ...

Stop Paying the Password Tax: A CFO’s Guide to Affordable Zero-Trust Access

In 2025, stolen credentials remain the most common and fastest path into an organization’s systems. Nearly half of breaches begin with compromised logins. The 2025 Verizon Data Breach Investigations Report puts it bluntly: “Hackers don’t ...

NDSS 2025 – YuraScanner: Leveraging LLMs For Task-driven Web App Scanning4+

SESSION Session 2B: Web Security Authors, Creators & Presenters: Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for Information Security), Gianluca De Stefano (CISPA Helmholtz Center ...

Log4j Vulnerability Guide: Detection and Remediation | Contrast

TL;DR Traditional security tools generate overwhelming false positives because they cannot tell which Log4j vulnerabilities are actually exploitable. This guide explains why IAST runtime detection provides accurate results and how ADR blocks ...

Landfall Android Spyware Targeted Samsung Phones via Zero-Day

Threat actors exploited CVE-2025-21042 to deliver malware via specially crafted images to users in the Middle East.  The post Landfall Android Spyware Targeted Samsung Phones via Zero-Day appeared first on SecurityWeek.

Inside the Adversary’s Playbook: Credential Abuse, Cloud Intrusions, and Lateral Movement

Most cyber breaches begin quietly, with a simple mistake. A misconfigured cloud bucket, a phishing email that looks just real enough, or an employee who forgets to revoke access when leaving the company. The ColorTokens Threat Advisory team ...

Radical Empowerment From Your Leadership: Understood by Few, Essential for All

When leaders redefine power as trust instead of control, teams unlock their potential — and organizations find their edge. The post Radical Empowerment From Your Leadership: Understood by Few, Essential for All appeared first on SecurityWeek.

EasyDMARC Launches Touchpoint – A Lead Generation Tool Designed for MSPs

Originally published at EasyDMARC Launches Touchpoint – A Lead Generation Tool Designed for MSPs by Anush Yolyan. Dover, Delaware- November 6, 2026 – Email security ... The post EasyDMARC Launches Touchpoint – A Lead Generation Tool ...

Securing the AI-Enabled Enterprise

AI-Driven Security Threats: Moving Beyond the Hype Security does a great job of sensationalizing attacks. This trend was set from a perspective of awareness and edge cases which the industry deals with as attacks and realized perspectives. While ...

Meet us at Future Identity Festival London 2025

Next week our founder Simon Moffatt will be hosting two panels at the Future Identity Festival in London. The two day event hosted an array of stages focused on financial services and fraud, identity and access management and fintech solutions ...

Cybersecurity Snapshot: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework

Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft ...

Data Exposure Vulnerability Found in Deep Learning Tool Keras

The vulnerability is tracked as CVE-2025-12058 and it can be exploited for arbitrary file loading and conducting SSRF attacks. The post Data Exposure Vulnerability Found in Deep Learning Tool Keras appeared first on SecurityWeek.

ClickFix Attacks Against macOS Users Evolving

ClickFix prompts typically contain instructions for Windows users, but now they are tailored for macOS and they are getting increasingly convincing. The post ClickFix Attacks Against macOS Users Evolving appeared first on SecurityWeek.