Application Security News and Articles


DEF CON 33: Mar Williams

Creators, Authors and Presenters: Dreadwear, Mar Williams Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the ...

Closing the Visibility Gap: Corporate Exposure Analytics in the Infostealer Era

Co-authored by Constella Intelligence and Kineviz As infostealer malware continues to scale in reach, automation, and precision, organizations face an increasingly urgent challenge: a lack of comprehensive visibility across their identity ...

Randall Munroe’s XKCD ‘’Cursed Number”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Cursed Number” appeared first on Security Boulevard.

Technical Analysis of Zloader Updates

IntroductionZloader (a.k.a. Terdot, DELoader, or Silent Night) is a Zeus-based modular trojan that emerged in 2015. Zloader was originally designed to facilitate banking, but has since been repurposed for initial access, providing an entry point ...

6 Ways CISOs Are Using AI to Prioritize Critical Vulnerabilities

Just like AI is transforming business operations, it’s revolutionizing how CISOs handle vulnerabilities. AI-powered vulnerability prioritization helps reduce alert noise, focus on high-risk issues, and automate remediation, enabling security ...

DEF CON 33: Darren Kitchen Hak5 Pager

Creators, Authors and Presenters: Ryan, Darren Kitchen Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the ...

Malicious GitHub pages lure MacOS users into installing Atomic infostealer

MacOS users looking to download popular software such as LastPass, 1Password, After Effects, Gemini, and many others are in danger of getting saddled with the Atomic infostealer instead, LastPass has warned. The malware delivery campaign is ...

The Complete Guide to Analyst Research Firms: How Innovative Companies Navigate the Landscape

90% of enterprise buyers consult analysts before purchasing. Yet most startups struggle with analyst relations. Here's your complete roadmap to navigating Gartner, Forrester, and 20+ top research firms—from a serial entrepreneur who's been on ...

Stellar Cyber 6.1 equips SecOps teams with multi-layer AI

Stellar Cyber announced Stellar Cyber 6.1, designed to help customers and partners advance toward a human-augmented autonomous SOC. With Stellar Cyber 6.1, organizations gain new levels of visibility, speed, and control. Powered by multi-layer ...

EXPLICATION SAST, SCA & CONTAINER SCAN

1. 🔍 SAST (Static Application Security Testing)Continue reading on Medium »

Sumo Logic Adds AI Agents to Automate Security Operations Tasks

Sumo Logic introduces AI agents powered by AWS Nova LLMs to query and summarize cybersecurity data, reducing manual toil and helping SecOps counter AI-driven attacks. The post Sumo Logic Adds AI Agents to Automate Security Operations Tasks ...

Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform

The Canada-based company has emerged from stealth with autonomous AI agents designed to manage and operate the security and IT stack. The post Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform appeared first on SecurityWeek.

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud

L1TF Reloaded is a vulnerability combining the old L1TF and half-Spectre hardware flaws to bypass deployed software mitigations. The post Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud appeared first on SecurityWeek.

European Airport Disruptions Caused by Ransomware Attack

Collins Aerospace is reportedly having difficulties recovering from the ransomware attack. The post European Airport Disruptions Caused by Ransomware Attack appeared first on SecurityWeek.

Classroom Manager Wins Back to School 2025 Award

Tech & Learning Awards of Excellence: Back to School 2025 Recognizes Classroom Manager BOULDER, Colo.—September 22, 2025—ManagedMethods is pleased to announce that Classroom Manager has won in this year’s Tech & Learning Awards of ...

AI Regulations & Frameworks: Building Risk Readiness | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post AI Regulations & Frameworks: Building Risk Readiness | Kovrr appeared first on Security Boulevard.

The AI Security Paradox: Why 85% of AI-Driven Threats Demand AI-First Defense

AI: The Double-Edged Sword in CybersecurityArtificial Intelligence (AI) is reshaping the cybersecurity landscape in ways we’ve never seen before. But there’s a paradox: the very technology that attackers use to launch sophisticated, adaptive, ...

The Compliance Automation Mirage: Why Vendors Keep Failing and Where AI Finally Gets It Right

If you’ve been in the trenches of enterprise risk and compliance for any length of time, you’ve heard the pitch: “Automate your compliance and save your team hours.” Dozens of vendors have said it. Most have meant well. And nearly all of ...

HoundBytes Launches Automated Security Analyst

The Romania-based company has launched WorkHorse and is preparing for a funding round to accelerate growth. The post HoundBytes Launches Automated Security Analyst appeared first on SecurityWeek.

Unpatched Fortra GoAnywhere instances at risk of full takeover (CVE-2025-10035)

If you’re running Fortra’s GoAnywhere managed file transfer solution and you haven’t updated to the latest available version for a while, do so now or risk getting your instance compromised via CVE-2025-10035. About CVE-2025-10035 ...