Application Security News and Articles


News alert: SquareX finds browser flaw undermining passkeys while exposing banking and SaaS apps

Palo Alto, Calif., Aug. 28, 2025, CyberNewswire — It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass adoption of passkeys, a passwordless authentication method leveraging ...

New York Attorney General Sues Zelle Parent Over Fraud Failures, Raising Stakes for Real-Time Payment Security

New York AG Letitia James has sued Zelle’s parent, Early Warning Services, over billions lost to fraud, spotlighting the urgent need for stronger safeguards, consumer protections, and risk quantification in real-time payments. The post New York ...

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon ...

Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33

Palo Alto, California, 28th August 2025, CyberNewsWire The post Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33 appeared first on Security Boulevard.

Your Map for the Cloud Security Maze: An Integrated Cloud Security Solution That’s Part of an Exposure Management Approach

Check out highlights from the IDC white paper “Bridging Cloud Security and Exposure Management for Unified Risk Reduction,” which explains how CNAPPs help security teams tame the complexity of multi-cloud environments by shifting from a ...

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations

Cybercriminals have started “vibe hacking” with AI’s help, AI startup Anthropic has shared in a report released on Wednesday. An attacker used the agentic AI coding assistant Claude Code for nearly all steps of a data extortion ...

Cybersecurity Models For K-12 School Districts

Cybersecurity models are structured frameworks that educational institutions reference to contain and mitigate cyberthreats. These models range in scope, from basic confidentiality guidelines to full-scale, multi-layered frameworks. Most are ...

CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry

CrowdStrike says the acquisition will bring valuable technology to enhance its Falcon Next-Gen SIEM. The post CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry appeared first on SecurityWeek.

Establishing DevSecOps for Small and Medium Organizations: Practical Controls, Challenges, and…

By Arvind Chauhan, Lead Consultant (Cyber Risk Services) at Secnuo.Continue reading on The AppSec Journal »

Next-Gen SIEM Platform

Security Information and Event Management (SIEM) has long been the foundation of enterprise cybersecurity. Traditional SIEM platforms were built to collect logs, correlate events, and generate alerts. While revolutionary in their time, they now ...

Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates

Join this live discussion to learn how organizations can strengthen ransomware defenses while staying ahead of tightening compliance requirements. The post Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates appeared first ...

The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your ...

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain ...

What You Don’t Log Will Hurt You – FireTail Blog

Aug 28, 2025 - Lina Romero - APIs have become the most targeted attack surface in enterprise environments, and AI (particularly agentic AI) is making it even harder to protect those critical connections. But one of the most often overlooked and ...

Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows

Get a firsthand look at how 400 security and IT leaders are tackling today’s cyber risk challenges in this latest study from Tenable and Enterprise Strategy Group. From budget allocation and prioritization methods to team structure, ...

FBI Issues Updated Warning on Salt Typhoon’s Global Cyber-Espionage Operations

The FBI has released new findings on a long-running cyber campaign that quietly infiltrated major U.S. telecommunications providers and critical infrastructure around the world. The campaign, carried out by a group of hackers linked to the ...

Can We Really Eliminate Human Error in Cybersecurity? 

Cybersecurity breaches often stem not from advanced exploits but from human error, misconfigurations, and routine mistakes. True resilience comes from designing systems that expect failure, leverage automation wisely, and foster a security-first ...

What’s the difference between CMC and VMC certification?

Common Mark Certificates (CMC) and Verified Mark Certificates (VMC) both enable brand logos in email inboxes via BIMI, boosting trust, security, and deliverability. The key difference? VMCs require trademark validation and show a blue checkmark ...

Why Traditional Zero-Trust Breaks Down with Agentic Identities

As AI agents become the new digital workforce, traditional zero-trust models fall short. Enterprises face an Access-Trust Gap that demands new runtime governance. Agentic Identity and Security Platforms (AISP) provide dynamic controls to secure ...

Cycuity Radix-ST identifies security weaknesses earlier in chip design

Cycuity introduces Radix-ST, a new product in its Radix portfolio of security solutions designed to leverage static analysis techniques to identify potential weaknesses early in the design cycle without requiring simulation or emulation. As ...