Application Security News and Articles


Criminal networks industrialize payment fraud operations

Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate tasks, and scale attacks. New data from a Visa report shows how these shifts are reshaping ...

FBI: Account Takeover Scammers Stole $262 Million this Year

The FBI says that account takeover scams this year have resulted in 5,100-plus complaints in the U.S. and $262 million in money stolen, and Bitdefender says the combination of the growing number of ATO incidents and risky consumer behavior is ...

NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis

Session 4B: Audio Security Authors, Creators & Presenters: PAPER VoiceRadar: Voice Deepfake Detection using Micro-Frequency And Compositional Analysis Recent advancements in synthetic speech generation, including text-to-speech (TTS) and ...

Randall Munroe’s XKCD ‘Heart Mountain’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Heart Mountain’ appeared first on Security Boulevard.

The Trust Crisis: Why Digital Services Are Losing Consumer Confidence

According to the Thales Consumer Digital Trust Index 2025, global confidence in digital services is slipping fast. After surveying more than 14,000 consumers across 15 countries, the findings are clear: no sector earned high trust ratings from ...

How to Protect from Online Fraud This Holiday Season

Peak e-commerce season hits retailers every year just as the Halloween decorations start to come down. Unsurprisingly, cyber criminals see this time as an opportunity to strike, and criminal activity online spikes alongside sales. Shockingly, ...

CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems

3 min readAs AI platforms grow more complex and interdependent, small failures can cast long shadows. That’s what happened inside the open-source CrewAI platform, where a vulnerability in its error-handling logic surfaced during a provisioning ...

Russian-Backed Threat Group Uses SocGholish to Target U.S. Company

The Russian state-sponsored group behind the RomCom malware family used the SocGholish loader for the first time to launch an attack on a U.S.-based civil engineering firm, continuing its targeting of organizations that offer support to Ukraine ...

Why prioritizing code quality is the fastest way to reduce security risks

The common perception is that a security vulnerability is a rare, complex attack pattern. In reality, the journey of most flaws begins much earlier and much more simply: as a code quality issue. For both developers and security practitioners, ...

NDSS 2025 – Machine Learning-Based loT Device Identification Models For Security Applications

Session4A: IoT Security Authors, Creators & Presenters: Eman Maali (Imperial College London), Omar Alrawi (Georgia Institute of Technology), Julie McCann (Imperial College London) PAPER Evaluating Machine Learning-Based IoT Device ...

Effortless SSL automation: why it’s faster and more cost-efficient than you think

SSL automation is easier than most organizations think, delivering 243% ROI, fewer outages, and readiness for 47-day SSL certificates. The post Effortless SSL automation: why it’s faster and more cost-efficient than you think appeared first on ...

Because fraud detection deserves better than another AI-written SEO page

If you landed here after searching for something like “browser fingerprint test”, “bot detection API”, or “Kameleo anti-detect browser”, then welcome. The search engine did its job, and so did we. Let’s be honest. The internet is ...

The Attack Surface of Cloud-Based Generative AI Applications is Evolving

It is the right time to talk about this. Cloud-based Artificial Intelligence, or specifically those big, powerful Large Language Models we see everywhere, they’ve completely changed the game. They’re more than just a new application ...

Gainsight breach: Salesforce details attack window, issues investigation guidance

The number of Salesforce customers affected by the recent compromise of Gainsight-published applications is yet to be publicly confirmed, but Salesforce released indicators of compromise (IoCs) and simultaneously shed some light on when the ...

Clover Security Raises $36 Million to Secure Software by Design

The cybersecurity startup embeds AI agents into widely used tools to identify design flaws and eliminate them early. The post Clover Security Raises $36 Million to Secure Software by Design appeared first on SecurityWeek.

INE Expands Cross-Skilling Innovations

Cary, North Carolina, USA, 26th November 2025, CyberNewsWire The post INE Expands Cross-Skilling Innovations appeared first on Security Boulevard.

Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI

Cybercriminals impersonating financial institutions have targeted individuals, businesses, and organizations of different sizes. The post Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI appeared first on SecurityWeek.

The Most Common SOAR Use Cases

How SOAR platforms are used in (and beyond) the SOC The post The Most Common SOAR Use Cases appeared first on AI Security Automation. The post The Most Common SOAR Use Cases appeared first on Security Boulevard.

Thousands of Secrets Leaked on Code Formatting Platforms

JSONFormatter and CodeBeautify users exposed credentials, authentication keys, configuration information, private keys, and other secrets. The post Thousands of Secrets Leaked on Code Formatting Platforms appeared first on SecurityWeek.

How Video Translation Enhances Multilingual User Training for SSO and Access Management Systems

Learn how video translation enhances multilingual SSO and IAM training, improves security, boosts user adoption, and ensures global compliance for organizations. The post How Video Translation Enhances Multilingual User Training for SSO and ...