Application Security News and Articles


Innovative Approaches to NHI Protection

Will Rising Cybercrimes Warrant a More Innovative Approach to NHI Protection? With the intensifying wave of cybercrimes, robust and innovative strategies are crucial in tackling these emerging threats. One area that is often overlooked yet holds ...

5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them

4 min readDiscover the emerging class of attacks involving software workloads and AI agents. The post 5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them appeared first on Aembit. The post 5 Common Ways Non-Human ...

OffensiveCon25 – Breaking The Sound Barrier: Exploiting CoreAudio Via Mach Message Fuzzing

Author/Presenter: Dillon Franke Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Patch Tuesday: Adobe documents hundreds of bugs across multiple products and warns of code execution, feature bypass risks. The post Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce appeared first on SecurityWeek.

How to Overcome Modern Colocation Challenges with DCIM Software

Effective digital infrastructure management remains crucial as colocation data centers grow more intricate and essential in supporting global digital operations. Modern Data Center Infrastructure Management (DCIM) platforms, such as Hyperview, ...

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Redmond warns that external control of a file name or path in WebDAV "allows an unauthorized attacker to execute code over a network." The post Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ appeared first on ...

Android Enterprise update puts mobile security first

Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over ...

Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053)

9Critical 56Important 0Moderate 0Low Microsoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild. Microsoft addresses 65 CVEs in its June 2025 Patch Tuesday release, with nine rated critical, and 56 ...

Randall Munroe’s XKCD ‘Trojan Horse’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Trojan Horse’ appeared first on Security Boulevard.

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

UNFInished business: We were warned this would happen. And now here we are. The post Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard.

OffensiveCon25 – Android In-The-Wild: Unexpectedly Excavating A Kernel Exploit

Author/Presenter: Seth Jenkins Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Double Dash, Double Trouble: A Subtle SQL Injection Flaw

Can a simple dash character introduce a security risk? Discover how SQL line comments can open the door to unexpected injection vulnerabilities in several PostgreSQL client libraries! The post Double Dash, Double Trouble: A Subtle SQL Injection ...

Industrial Cybersecurity 2025: Key Takeaways from our Webinar

In a timely and candid webinar hosted by Axio, leading experts discussed what’s working (and what’s not) in industrial cybersecurity as we look toward 2025. Featuring insights from cybersecurity veteran Read More The post Industrial ...

Unlock the Power of Plixer One: AI-Driven Network Data Analysis

Plixer is live from Cisco Live 2025 at the San Diego Convention Center, and they’re ready to showcase the future of AI-driven network visibility. Join Peter Silva as he catches up with Nils Werner for a behind-the-scenes look at what attendees ...

Marks & Spencer Suffers Ransomware Attack by Scattered Spider Group

Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the ransomware attack that recently hit Marks & Spencer.  The post Marks & Spencer Suffers ...

ArmorCode provides enterprises with contextual understanding of their code repositories

ArmorCode launched AI Code Insights, a new set of capabilities that leverages ArmorCode’s agentic AI, Anya, to provide enterprises with contextual understanding of their code repositories, empowering security and development teams to secure ...

Hackers Stole 300,000 Crash Reports From Texas Department of Transportation

The Texas Department of Transportation has disclosed a data breach impacting the personal information included in 300,000 crash reports. The post Hackers Stole 300,000 Crash Reports From Texas Department of Transportation appeared first on ...

How Azul Identifies Java Security Vulnerabilities with 1,000 Times Greater Accuracy

Azul identifies and prioritizes known Java security vulnerabilities with 1,000 times greater accuracy than traditional APM or AppSec tools. The post How Azul Identifies Java Security Vulnerabilities with 1,000 Times Greater Accuracy appeared ...

Webinar: Cloud security made easy with CIS Hardened Images

This webinar is designed for leadership and management professionals looking to enhance their organization’s security posture in the cloud. The authors explore CIS Hardened Images: how they work, the security benefits they offer, and why ...

Secure mobile applications with Dart, Flutter, and Sonatype

The Dart coding language and the Flutter framework architecture are gaining traction among developers looking to build fast, reliable, cross-platform applications. The post Secure mobile applications with Dart, Flutter, and Sonatype appeared ...