Application Security News and Articles


Semgrep Raises $100M for AI-Powered Code Security Platform

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures.  The post Semgrep Raises $100M for AI-Powered Code Security Platform appeared first on SecurityWeek.

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US

DeepSeek has computer code that could send some user login information to China Mobile. The post Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US appeared first on SecurityWeek.

DEF CON 32 – DIY Pharmaceuticals

Authors/Presenters: Michael Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

DeepSeek AI Model Riddled With Security Vulnerabilities

Security researchers have uncovered serious vulnerabilities in DeepSeek-R1, the controversial Chinese large language model (LLM) that has drawn widespread attention for its advanced reasoning capabilities. The post DeepSeek AI Model Riddled With ...

In The News | TCEA 2025: 10 Ways K–12 Schools Can Secure Their Microsoft and Google Environments

This article was originally published in EdTech Magazine on 02/03/25 by Taashi Rowe. These simple steps can help schools comply with federal laws while protecting networks and student data. Hackers don’t have to use very sophisticated, ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #323 Why Work Agile?

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Are You Still Using VMware Tanzu? (And Is Now the Time to Migrate?)

Many organizations used VMware Tanzu when they were seeking to modernize their applications and infrastructure. This suite of products and services was designed to help organizations build, manage, and run modern applications on Kubernetes across ...

Fake VS Code extension on npm uses altered ScreenConnect utility as spyware

A counterfeit 'Truffle for VS Code' extension, published on the npmjs registry, abuses the ConnectWise ScreenConnect remote desktop utility, allowing threat actors to compromise Windows systems that install the package. The post Fake VS Code ...

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)

XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution for warehouse management and order ...

How Agentic AI will be Weaponized for Social Engineering Attacks

With each passing year, social engineering attacks are becoming bigger and bolder thanks to rapid advancements in artificial intelligence. The post How Agentic AI will be Weaponized for Social Engineering Attacks appeared first on SecurityWeek.

DEF CON 32 – Responding To Breaches, Ransomware And State Sponsored Threat Actors

Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

4 Ways to Mitigate the Human Factors of Cybersecurity

Before exploring how to mitigate the human factors in cybersecurity, it's essential to understand what this term means. The human factors of cybersecurity refer to the actions or events where human error leads to a successful hack or data breach. ...

Forging a Better Operator Quality of Life

A new Mythic add-on for Windows Agents Mythic provides flexibility to agent developers for how they want to describe and execute techniques. While this is great, it also means that when operators hop from agent to agent, they can have issues ...

Hacker Conversations: David Kennedy – an Atypical Typical Hacker

David Kennedy is a hacker. There is no doubt about that. He has qualities common among hackers, but also many differences. The post Hacker Conversations: David Kennedy – an Atypical Typical Hacker appeared first on SecurityWeek.

SafeBreach exposure validation platform identifies security gaps

SafeBreach launched SafeBreach exposure validation platform, which combines the power of its time-tested breach and attack simulation (BAS) product—now called Validate—and its new attack path validation product, Propagate. Together, they ...

Cyber Insights 2025: OT Security

Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ. The post Cyber Insights 2025: OT Security appeared first on SecurityWeek.

Swap EOL Zyxel routers, upgrade Netgear ones!

There will be no patches for EOL Zyxel routers under attack via CVE-2024-40891, the company has confirmed. Meanwhile, Netgear has issued patches for critical flaws affecting its routers and wireless access points. Zyxel vulnerability: Exploited, ...

Preventing account takeover on centralized cryptocurrency exchanges in 2025

By Kelly Kaoudis and Evan Sultanik This blog post highlights key points from our new white paper Preventing Account Takeovers on Centralized Cryptocurrency Exchanges, which documents ATO-related attack vectors and defenses tailored to CEXes. ...

Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach

Our zLabs research team has discovered a mobile malware campaign consisting of almost 900 malware samples primarily targeting users of Indian banks. The post Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach appeared first on ...

Cybersecurity M&A Roundup: 45 Deals Announced in January 2025

A significant number of cybersecurity-related merger and acquisition (M&A) deals announced in January 2025.  The post Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 appeared first on SecurityWeek.