Application Security News and Articles


CVE-2025-3248: RCE vulnerability in Langflow

IntroductionCVE-2025-3248, a critical remote code execution (RCE) vulnerability with a CVSS score of 9.8, has been discovered in Langflow, an open-source platform for visually composing AI-driven agents and workflows. The issue resides in the ...

CircuitMeter Integrates Its Advanced Energy Metering With Hyperview DCIM Platform

Integration delivers real-time, circuit-level energy insights and analytics to help data centers reduce costs, improve efficiency, and meet sustainability goals Toronto, ON and Vancouver, BC – April 22, 2025: CircuitMeter, a pioneer in ...

The AI Bot Epidemic: The Imperva 2025 Bad Bot Report

The AI Bot Epidemic: The Imperva 2025 Bad Bot Report madhav Tue, 04/22/2025 - 17:10 The ubiquity of accessible AI tools has lowered the barrier to entry for threat actors, helping them create and deploy malicious bots at an unprecedented scale. ...

Randall Munroe’s XKCD ‘Anchor Screws’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Anchor Screws’ appeared first on Security Boulevard.

Zero-Day Attack Prevention with Contrast ADR | Real-Time Detection of Zero-Day Exploits of Unknown Vulnerabilities | Contrast Security

The majority — 11 out of 15 — of the top Common Vulnerabilities and Exposures (CVEs) in CISA’s most recent annual Cybersecurity Advisory (CSA) were initially exploited as zero days.  The post Zero-Day Attack Prevention with Contrast ADR | ...

AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights

AppOmni and Splunk SaaS work together to elevate SaaS security with enriched insights, streamlined investigations, and advanced AI-driven detection. The post AppOmni and Splunk SaaS: A Unified Front for Enhanced Security Insights appeared first ...

Cloud Data Security Play Sentra Raises $50 Million Series B 

Sentra has now raised north of $100 million for controls technology to keep sensitive data out of misconfigured AI workflows. The post Cloud Data Security Play Sentra Raises $50 Million Series B  appeared first on SecurityWeek.

DataKrypto Launches Homomorphic Encryption Framework to Secure Enterprise AI Models

DataKrypto’s FHEnom for AI combines real-time homomorphic encryption with trusted execution environments to protect enterprise data and models from leakage, exposure, and tampering. The post DataKrypto Launches Homomorphic Encryption Framework ...

54% of tech hiring managers expect layoffs in 2025

54% of tech hiring managers say their companies are likely to conduct layoffs within the next year, and 45% say employees whose roles can be replaced by AI are most likely to be let go, according to a new study by General Assembly. “We’re on ...

BSidesLV24 – Common Ground – On Your Ocean’s 11 Team, I’m the AI Guy (or Girl)

Author/Presenter: Harriet Farlow Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

​Elevate your organization’s success: Submissions now open for the 2025 Sonatype Elevate Awards

We are thrilled to announce that the 2025 Sonatype Elevate Awards are officially open for submissions. The post ​Elevate your organization’s success: Submissions now open for the 2025 Sonatype Elevate Awards appeared first on Security ...

KuppingerCole Names Aembit a “Rising Star” for Non-Human IAM

2 min readAs machine-to-machine communication eclipses human access, Aembit's secretless approach to non-human identity is gaining industry recognition. The post KuppingerCole Names Aembit a “Rising Star” for Non-Human IAM appeared first on ...

Not All Multipath Is Created Equal

We live in a world obsessed with speed and reliability. Whether it's streaming our favorite shows, conducting mission-critical business operations, or simply browsing the web, we demand seamless connectivity. This has led to the rise of many ...

Cyberattack Knocks Texas City’s Systems Offline

The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack. The post Cyberattack Knocks Texas City’s Systems Offline appeared first on SecurityWeek.

GUEST ESSAY: Ponemon study warns: AI-enhanced deepfake attacks taking aim at senior execs

A new study by the Ponemon Institute points to a concerning use of AI: deepfake attacks are on the rise and are taking a financial and reputational toll on companies and their executives. Related: Tools to fight deepfakes Deepfake Deception: … ...

Building a Smarter, Safer Grid with IEEE 2030.5 and Certificate Lifecycle Management Automation

The renewable energy landscape is evolving fast—bringing smarter, more sustainable ways to generate, distribute, and use power. At the heart of this transformation is a lesser-known but vital standard: IEEE 2030.5—a foundational protocol that ...

5 Red Team Exercises That Expose Your Real Security Gaps in 2025

Most security tools create a false sense of protection. Explore 5 realistic red team exercises with Notion templates that help you plan tests mirroring sophisticated attackers and identify critical vulnerabilities in your organization The post 5 ...

Perforce Puppet update accelerates vulnerability remediation

Perforce Software announced its latest platform update for Puppet Enterprise Advanced, designed to streamline DevSecOps practices and fortify enterprise security postures. This release incorporates more advanced and proactive remediation options, ...

Getting the Most Value Out of the OSCP: The Exam

A practical guide to maximizing the short- and long-term benefits of your upcoming OSCP exam attempt(s). Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s ...

A Comparative Analysis of Anthropic’s Model Context Protocol and Google’s Agent-to-Agent Protocol

As AI agents transform enterprise technology, two critical protocols are emerging as industry standards: Anthropic's MCP for connecting AI to data sources and Google's A2A for agent collaboration. This analysis breaks down how these frameworks ...