Application Security News and Articles


Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Novakon HMIs are affected by remote code execution and information exposure vulnerabilities.  The post Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking appeared first on SecurityWeek.

Cybersecurity Consulting

As businesses expand digitally, their attack surface grows exponentially. Cyber threats today are no longer limited to viruses or spam emails—they include ransomware, insider threats, phishing, supply chain attacks, zero-day exploits, and ...

Recap of Our “Passkeys Pwned” Talk at DEF CON

What the ”Passkeys Pwned” talk is and isn’t about, and what it reveals about the importance of correct implementation of the standard The Passkeys Pwned Talk Summary As outlined in the DEF CON abstract below, the Passkeys Pwned attack ...

What is CIAM? A Comprehensive Definition of Customer Identity Management

Unlock the comprehensive definition of CIAM (Customer Identity and Access Management). Learn about its benefits, key features, and how it differs from IAM. Perfect for Devs! The post What is CIAM? A Comprehensive Definition of Customer Identity ...

Enterprise Cybersecurity Strategy: How to Secure Large Scale Businesses

Enterprise cybersecurity involves a wide-ranging method aimed at protecting company networks, data, apps, and cloud platforms from a rising number of cyber threats. It focuses on lowering weaknesses, strengthening security measures, and keeping ...

LLMs can boost cybersecurity decisions, but not for everyone

LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making ...

Researchers believe Gamaredon and Turla threat groups are collaborating

ESET Research has discovered evidence of collaboration between the Gamaredon and Turla threat groups. Both groups are linked to Russia’s primary intelligence agency, the FSB, and were found working in tandem to target high-profile organizations ...

Shifting supply chains and rules test CPS security strategies

Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage ...

The real-world effects of EU’s DORA regulation on global businesses

In this Help Net Security video, Matt Cooper, Director of Governance, Risk, and Compliance at Vanta, discusses the EU’s Digital Operational Resilience Act (DORA) and its effects six months after it went into effect. DORA is the first EU-wide ...

The unseen side of malware and how to find it

Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of the story. Hidden malware variants are quietly slipping past ...

New infosec products of the week: September 19, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, Catchpoint, Nagomi Security, Neon Cyber, and QuSecure. Absolute Security Rehydrate restores compromised endpoints Rehydrate delivers ...

What Makes an AI Governance Framework Effective?

Key Takeaways Artificial intelligence is being adopted at a remarkable pace. Enterprises now use AI in customer service, fraud detection, logistics, healthcare diagnostics, and dozens of other areas. With this adoption comes a new category of ...

News alert: Palo Alto flags threats that evade Secure Web Gateways — echoing SquareX research

Palo Alto, Calif., Sept. 18, 2025, CyberNewswire: SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year, warning the security community of 20+ attacks that allow attackers to bypass all major SASE/SSE ...

The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It)

SOC automation breaks in the messy middle of triage and investigation. Learn how Morpheus AI fixes it with transparent, adaptive playbooks. The post The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It) appeared first on D3 ...

Phishing Attack

Phishing remains one of the most successful cyberattack techniques today. Despite decades of awareness campaigns, it continues to deceive individuals and organizations into giving away sensitive information, from login credentials to financial ...

DEF CON 33: AIxCC With ShellPhish

Creators, Authors and Presenters: Silk Interviews Members ShellPhish Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events ...

“Shai-Hulud” npm Attack: What You Need to Know

Get details on this supply chain attack. The post “Shai-Hulud” npm Attack: What You Need to Know appeared first on Security Boulevard.

How the Best Bank Reconciliation Software Simplifies Audits and Strengthens Compliance

Discover how the best bank reconciliation software simplifies audits, ensures compliance, reduces errors, and strengthens financial transparency. The post How the Best Bank Reconciliation Software Simplifies Audits and Strengthens Compliance ...

Insider Threats and the Power of Just-in-Time Privileged Access 

September marks National Insider Threat Awareness Month, a reminder that some of the biggest security risks to an organization do not come from shadowy external hackers, but from the people already inside the walls. Employees, contractors, and ...

CrowdStrike Aims to Define New Security Model Based on AI Agents 

CrowdStrike unveiled its Falcon Agentic Security Platform at Fal.Con 2025, ushering in the “agentic era of cybersecurity.” With AI-powered agents, unified data governance, and threat intelligence, the platform aims to counter adversaries ...