Application Security News and Articles


SAP Patches Critical Code Injection Vulnerabilities

SAP released 20 security notes on April 2025 patch day, including three addressing critical code injection and authentication bypass flaws. The post SAP Patches Critical Code Injection Vulnerabilities appeared first on SecurityWeek.

11 cyber defense tips to stay secure at work and home

Cybersecurity is inextricably tied to the technology it protects. Just as technology continues to grow in variety, quantity, and presence in all of our lives, so too does cybersecurity and our personal responsibility for it. You might be ...

Aurascape Banks Hefty $50 Million to Mitigate ‘Shadow AI’ Risks

Silicon Valley startup secures big investment from Menlo Ventures and Mayfield Fund to solve the “shadow AI” security problem. The post Aurascape Banks Hefty $50 Million to Mitigate ‘Shadow AI’ Risks appeared first on SecurityWeek.

WhatsApp Vulnerability Could Facilitate Remote Code Execution

An update for the WhatsApp desktop app for Windows patches CVE-2025-30401, a spoofing vulnerability that could be used to trick users. The post WhatsApp Vulnerability Could Facilitate Remote Code Execution appeared first on SecurityWeek.

ESET Vulnerability Exploited for Stealthy Malware Execution

A sophisticated APT tracked as ToddyCat has exploited an ESET DLL search order hijacking vulnerability for malware delivery. The post ESET Vulnerability Exploited for Stealthy Malware Execution appeared first on SecurityWeek.

Netskope One DLP On Demand enhances data security capabilities

Netskope announced Netskope One DLP On Demand, the newest component in its unified Netskope One Data Security service. Netskope One DLP On Demand enables new data protection integrations for Netskope technology alliance partners, on-premises ...

The race to secure the AI/ML supply chain is on — get out front

The explosive growth in the use of generative artificial intelligence (gen AI) has overwhelmed enterprise IT teams. To keep up with the demand for new AI-based features in software — and to deliver software faster in general — development ...

Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security

The new funds will be used to extend Corsha’s reach into critical infrastructure and further improve its own use of AI. The post Corsha Raises $18 Million to Enhance and Extend Machine-to-Machine Security appeared first on SecurityWeek.

Tailscale Raises $160 Million for Secure Networking Platform 

Tailscale’s new Series C funding round brings the total raised by the company for its secure networking platform to $275 million. The post Tailscale Raises $160 Million for Secure Networking Platform  appeared first on SecurityWeek.

In The News | ManagedMethods Launches Classroom Manager to Protect Students from Online Harm, Put Control Back in the Hands of Educators

This article was originally published in Newswire on 04/03/25. Introduction of Classroom Manager comes during a pivotal moment for educators balancing effective classroom learning with decreasing student engagement ManagedMethods, the leading ...

Arguing Against CALEA

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while ...

Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk

More than 5,000 Ivanti Connect Secure appliances are vulnerable to attacks exploiting CVE-2025-22457, which has been used by Chinese hackers. The post Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk appeared first on SecurityWeek.

Ontinue empowers organizations to mitigate phishing threats

Ontinue announced ION for Enhanced Phishing Protection. This new add-on service extends phishing detection and response capabilities for ION MXDR customers, significantly reducing cyber risk by handling emails reported as suspicious by end users. ...

Android Update Patches Two Exploited Vulnerabilities

Android’s latest security update resolves two exploited Kernel vulnerabilities, as well as critical-severity bugs. The post Android Update Patches Two Exploited Vulnerabilities appeared first on SecurityWeek.

The Web application Penetration Testing Tools That Actually Works

If your website handles any kind of user data, chances are it’s being watched. And not just by customers. Hackers, too. That’s why web application penetration testing tools is no... The post The Web application Penetration Testing Tools That ...

Identifying and Mitigating Vulnerabilities — SAST and DAST

In the world of software development, security is paramount — especially for Java applications, which are widely used in enterprise…Continue reading on Medium »

Threat Actors Setting Up Persistent Access to Hosts Hacked in CrushFTP Attacks

Huntress has shared details on the post-exploitation activities of threat actors targeting the recent CrushFTP vulnerability. The post Threat Actors Setting Up Persistent Access to Hosts Hacked in CrushFTP Attacks appeared first on SecurityWeek.

Qevlar Raises $14M to Lead the Agentic AI Revolution

Qevlar leads the agentic AI revolution and raises $14 million in total funding, including a fresh $10 million round led by EQT Ventures and Forgepoint Capital International. The post Qevlar Raises $14M to Lead the Agentic AI Revolution appeared ...

PowerDMARC to showcase email security advancements at RSAC 2025

PowerDMARC, a leading provider of email authentication and domain security solutions, is excited to announce its participation at RSAC 2025 Conference (April 28 – May 1) at the Moscone Center in San Francisco. PowerDMARC will be exhibiting ...

The Silent Threat in CI/CD: How Hackers Target Your Automation?

Let’s enter the world of software development! Automation has now become the heartbeat of contemporary DevOps practices. However, on the backdrop, the threat associated with it has been growing at a similar rate. Tools like GitHub Actions are ...