Application Security News and Articles


NetFoundry OT security platform protects critical infrastructure

NetFoundry unveiled a new version of its OT security platform enabling customers to secure critical infrastructure, including for on-premises and air-gapped environments such as substations. The announcement meets three customer demands: ...

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms

Thales Named Overall Leader in KuppingerCole’s Leadership Compass Data Security Platforms madhav Tue, 03/25/2025 - 07:37 Thales has been named an Overall Leader in the 2025 KuppingerCole Leadership Compass in the Data Security Platforms ...

Will the FDA Start Banning Chinese-Made Medical Devices?

Interview with Joe Silvia, CEO of MedWare Cyber Click here to listen. In late January, the FDA issued a safety warning on Contec CMS8000 patient monitors and those relabeled as MN-120. The Chinese-made devices, used by thousands of medical ...

Spring clean your security data: The case for cybersecurity data hygiene

Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess. The modern Security Operations ...

OT systems are strategic targets in global power struggles

Compared to 2023, 2024 saw a smaller increase in cyberattacks that caused physical consequences on OT organizations, according to Waterfall Security. Nevertheless, there were sharp jumps in the number of sites affected by the hacks, as well as in ...

89% of Enterprises GenAI Usage Is Untracked, Posing Security Risks

Generative AI (GenAI) has emerged as a powerful tool for enterprises. However, a recent report by LayerX revealed a startling statistic: 89% of enterprise GenAI usage is invisible to organizations, exposing them to critical security risks. This ...

How AI agents could undermine computing infrastructure security

In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks. Unlike traditional software, AI agents aren’t fully ...

Cybersecurity jobs available right now: March 25, 2025

Analyst – Cyber Threat Intelligence Adecco | UAE | On-site – View job details As an Analyst – Cyber Threat Intelligence, you will conduct threat hunting missions across multi-cloud environments and perform cyber ...

Next.js Middleware Permission Bypass Vulnerability (CVE-2025-29927)

Overview Recently, NSFOCUS CERT detected that Next.js issued a security announcement and fixed the middleware permission bypass vulnerability (CVE-2025-29927). Because Next.js lacks effective verification of the source of the ...

CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514: Frequently Asked Questions About IngressNightmare

Frequently asked questions about five vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively known as IngressNightmare. Background The Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked ...

The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations

While affected teams face months of disruption, organizations leveraging D3 Morpheus can reap the benefits of its vendor-resilient security architecture. The post The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations ...

Advanced Malware Targets Cryptocurrency Wallets

  More attacks targeting cryptocurrency users.  Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via web ...

Mastering AirSwap $sAST Rewards for Maximum Earnings

Learn the Best Techniques to Earn More with AirSwapContinue reading on Medium »

The Rise of OAuth Attacks to Access Sensitive Systems | Grip

OAuth attacks are increasing, exploiting SaaS blind spots to gain covert access. Learn how these attacks work and why visibility is key to mitigating the risks. The post The Rise of OAuth Attacks to Access Sensitive Systems | Grip appeared first ...

Spit Happens: 23andMe is Bankrupt — Secure Your DNA Data NOW Already

Double hell-ix: Personal genomics firm tells customers your data is safe—but few will trust the loss-making biotech pioneer. The post Spit Happens: 23andMe is Bankrupt — Secure Your DNA Data NOW Already appeared first on Security Boulevard.

News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches

Cary, NC, Mar. 24, 2025, CyberNewswire –– INE Security, a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition ...

DEF CON 32 – Recon Village – Bastardo Grande: Hunting the Largest Black Market Bike Fence

Speaker: Bryan Hance Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

News alert: Arsen introduces new AI-based phishing tests to improve social engineering resilience

Paris, France, Mar. 24, 2025, CyberNewswire — Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing ...

Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025

Cary, NC, 24th March 2025, CyberNewsWire The post Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025 appeared first on Security Boulevard.

Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique

A Cato Networks threat researcher with little coding experience was able to convince AI LLMs from DeepSeek, OpenAI, and Microsoft to bypass security guardrails and develop malware that could steal browser passwords from Google Chrome. The post ...