Application Security News and Articles


Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft

Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware. The post Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft appeared first on SecurityWeek.

How UK SMBs Can Handle Sensitive Information Without Breaking the Law (or the Bank)

How UK SMBs Can Handle Sensitive Information Without Breaking the Law (or the Bank) Introduction Data is the lifeblood of modern businesses, but for small and medium-sized enterprises (SMBs), it can also be a legal, financial, and reputational ...

How RAG Models Work in AI-Based Vulnerability Scanner

AI-powered vulnerability scanners are increasingly using Retrieval-Augmented Generation (RAG) models to improve the detection of security issues in infrastructure. RAG is a technique that combines large language models (LLMs) with external ...

Spying on People Through Airportr Luggage Delivery Service

Airportr is a service that allows passengers to have their luggage picked up, checked, and delivered to their destinations. As you might expect, it’s used by wealthy or important people. So if the company’s website is insecure, you’d be ...

Sandboxing: A Safe Space for Dangerous Code

In our increasingly interconnected digital world, the need to interact with untrusted or potentially malicious code is not just a…Continue reading on Medium »

Cyber Risk Management Firm Safe Raises $70 Million

Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents. The post Cyber Risk Management Firm Safe Raises $70 Million appeared first on SecurityWeek.

Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images

Echo received funding for creating thousands of container images that are not affected by any CVE, for enterprise-grade software infrastructure.   The post Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images appeared first ...

Bill Aims to Create National Strategy for Quantum Cybersecurity Migration

Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats. The post Bill Aims to Create National Strategy for Quantum Cybersecurity Migration appeared first on SecurityWeek.

$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025

Meta is sponsoring ZDI’s Pwn2Own hacking competition, where participants can earn big prizes for smartphone, WhatsApp and wearable device exploits. The post $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 appeared first on ...

Smart steps to keep your AI future-ready

In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, ...

It’s time to sound the alarm on water sector cybersecurity

A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean water supply can have serious public health and safety consequences, and threat actors know the damage they can cause. Water ...

What attackers know about your company thanks to AI

In this Help Net Security video, Tom Cross, Head of Threat Research at GetReal Security, explores how generative AI is empowering threat actors. He breaks down three key areas: how GenAI lowers the technical barrier for attackers, enables highly ...

Review: CISA Certified Information Systems Auditor Practice Tests

CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a ...

Security gaps still haunt shared mobile device use in healthcare

Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still struggling to manage the security risks that come with them, according to ...

Infosec products of the month: July 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Akeyless, At-Bay, Barracuda Networks, Bitdefender, Cynomi, Darwinium, DigitalOcean, Immersive, Lepide, Malwarebytes, ManageEngine, NETSCOUT, PlexTrac, ...

Lack of Visibility Isn’t the Problem. It’s What Happens Next That Should Worry You.

In network security, visibility is essential, but it’s not the endgame. Here’s why understanding the consequences of poor visibility matters more than visibility itself. If you’ve been in security long... The post Lack of Visibility Isn’t ...

External Attack Surface Management: The Complete Guide

With cloud services, remote work, and digital transformation accelerating the expansion of attack surfaces, relying on traditional security tools alone is no longer enough. External attack surface management (EASM) gives... The post External ...

Exciting Developments in NHIDR

Are You Prepared to Tackle the Evolving Landscape of Cybersecurity? Data breaches, security threats, and compliance issues – these are common narratives. Amid the cacophony of these significant challenges, is your organization prepared to ...

Gaining Independence with Advanced PAM

How Does Advanced PAM Empower Your Cybersecurity? When it comes to cybersecurity, one must continuously question: How do we fortify our systems and shield them against potential breaches? Recognizing the answer to this lies in Non-Human ...

AI meets ransomware: a new cyber threat

Ransomware has long been one of the most feared cyber threats on the internet, and for good reason. It’s fast, disruptive, and increasingly effective at locking up your most important files and demanding payment in exchange for their return. ...