Application Security News and Articles


Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks

In-depth model testing reveals a wide range of flaws with high failure rates The post Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks appeared first on Security Boulevard.

The Art of Human-AI Synergy: A Framework for Smart Collaboration

A proven framework for merging human intuition with AI precision to enhance innovation, reduce bias, and scale operations. Explores real-world case studies, ethical considerations, and hybrid workflows that outperform pure automation models. ...

DEF CON 32 – Eradicating Hepatitis C with BioTerrorism

Authors/Presenters: Mixæl Swan Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack 

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.”  The post Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack  ...

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

We’re just getting started down the road to the Internet of Everything (IoE.) Related: IoT growing at a 24% clip To get there – to fully tap the potential of a hyper-interconnected ecosystem where devices, data, AI and humans converge … ...

Chinese DeepSeek AI App: FULL of Security Holes Say Researchers

Xi knows if you’ve been bad or good: iPhone app sends unencrypted data to China—and Android app appears even worse. The post Chinese DeepSeek AI App: FULL of Security Holes Say Researchers appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Suspension Bridge’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Suspension Bridge’ appeared first on Security Boulevard.

Phishing Season 2025: The Latest Predictions Unveiled

Every year, cybercriminals sharpen their tools and refine their tactics to exploit network and security vulnerabilities. Gone are the days of clumsy emails with glaring typos and suspicious attachments. Instead, we face an era of new ...

Attackers Use 2.8 Million Devices in Major Brute Force Attack

Threat actors are using as many as 2.8 million edge and IoT devices from around the world in a massive brute force attack that is targeting edge security systems from Palo Alto Networks, Ivanti, SonicWall, and other vendors, according to the ...

Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations

The Praetorian Labs team was tasked with identifying novel and previously undocumented persistence mechanisms for use in red team engagements. Our primary focus was on persistence techniques achievable through modifications in HKCU, allowing for ...

DEF CON 32 – Hunters And Gatherers A Deep Dive Into The World Of Bug Bounties

Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Critical Role of CISOs in Managing IAM – Including Non-Human Identities

NHIs outnumber human users in enterprises, yet many IAM strategies ignore them. Learn why CISOs must own NHI governance to prevent security breaches. The post The Critical Role of CISOs in Managing IAM – Including Non-Human Identities ...

Privacy Roundup: Week 6 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 2 FEB 2025 - 8 FEB 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due to ...

Veridas helps companies combat AI-driven injection attacks

Generative AI is fueling a new wave of identity fraud, making digital security more critical than ever. In response, Veridas has introduced an advanced injection attack detection capability to combat the growing threat of synthetic identities. ...

Cloud-native certificate lifecycle management: exploring the benefits & capabilities

Cloud-native certificate lifecycle management (CLM) revolutionizes digital certificate handling by automating issuance, renewal, and revocation. Unlike traditional on-premise methods, cloud-native platforms enhance security, scalability, and ...

Malicious ML models found on Hugging Face Hub

Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for datasets and pre-trained models. Once one of them is downloaded and executed on the developer’s ...

Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in Paris

French organizers said “the summit aims at promoting an ambitious French and European AI strategy” as advances in the sector have been led by the U.S. and China. The post Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in ...

Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations

A critical vulnerability found in Orthanc servers can pose a serious risk to medical data and healthcare operations. The post Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations appeared first on SecurityWeek.

Microsoft Expands Copilot Bug Bounty Program, Increases Payouts

Microsoft has added more Copilot consumer products to its bug bounty program and is offering higher rewards for medium-severity vulnerabilities. The post Microsoft Expands Copilot Bug Bounty Program, Increases Payouts appeared first on SecurityWeek.

Could you Spot a Digital Twin at Work? Get Ready for Hyper-Personalized Attacks

The world is worried about deepfakes. Research conducted in the U.S. and Australia finds that nearly three-quarters of respondents feel negatively about them, associating the AI-generated phenomenon with fraud and misinformation. But in the ...