Application Security News and Articles


NDSS 2025 -I Know What You Asked: Prompt Leakage Via KV-Cache Sharing In Multi-Tenant LLM Serving

Session 6A: LLM Privacy and Usable Privacy Authors, Creators & Presenters: Guanlong Wu (Southern University of Science and Technology), Zheng Zhang (ByteDance Inc.), Yao Zhang (ByteDance Inc.), Weili Wang (Southern University of Science and ...

Your AI Agents Aren’t Hidden. They’re Ungoverned. It’s time to Act

“Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible.” – St. Francis of Assisi In the 12th century, St. Francis wasn’t talking about digital systems, but his advice remains startlingly ...

Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million

A data breach of credit reporting and ID verification services firm 700Credit affected 5.6 million people, allowing hackers to steal personal information of customers of the firm's client companies. 700Credit executives said the breach happened ...

Randall Munroe’s XKCD ‘Service Outage’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Service Outage’ appeared first on Security Boulevard.

5 Questions HR and Security Must Answer Before Implementing Workforce Identity Verification in 2026

Identity verification is quickly becoming a cornerstone of workforce security. What started as a targeted solution for stopping fake applicants or verifying new hires has expanded into something much larger: organizations now recognize that ...

Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow

AI can be used by extremist groups to pump out propaganda or deepfakes at scale, widening their reach and expanding their influence. The post Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow appeared first on ...

ServiceNow in Advanced Talks to Acquire Armis for $7 Billion: Reports

ServiceNow Inc. is in advanced talks to acquire cybersecurity startup Armis in a deal that could reach $7 billion, its largest ever, according to reports. Bloomberg News first reported the discussions over the weekend, noting that an announcement ...

NDSS 2025 – Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report

Session 6A: LLM Privacy and Usable Privacy Authors, Creators & Presenters: Xiaoyuan Wu (Carnegie Mellon University), Lydia Hu (Carnegie Mellon University), Eric Zeng (Carnegie Mellon University), Hana Habib (Carnegie Mellon University), Lujo ...

What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts

The internet stayed busy, brittle, and under constant pressure in 2025. Cloudflare’s annual Radar Year in Review offers a wide view of how traffic moved, where attacks clustered, and what failed when systems were stressed. Cloudflare, which ...

Astra introduces offensive-grade cloud vulnerability scanner to cut noise and prove risk

Astra Security announced the launch of its Cloud Vulnerability Scanner, a new solution designed to help organizations continuously maintain validated cloud security. Cloud infrastructures change constantly as teams create new IAM roles, adjust ...

Security for AI: How Shadow AI, Platform Risks, and Data Leakage Leave Your Organization Exposed

Your employees are using AI whether you’ve sanctioned it or not. And even if you’ve carefully vetted and approved an enterprise-grade AI platform, you’re still at risk of attacks and data leakage. Key takeaways: Security teams face three ...

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery

Google has also mentioned seeing React2Shell attacks conducted by Iranian threat actors. The post Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery appeared first on SecurityWeek.

The State of U.S. State and Local Government Cybersecurity (2024-2025): Why Unified AI Defense Is Now Essential

State, Local, Tribal, and Territorial (SLTT) governments operate the systems that keep American society functioning: 911 dispatch centers, water treatment plants, transportation networks, court systems, and public benefits portals. When these ...

Cloud Monitor Wins Cybersecurity Product of the Year 2025

Campus Technology & THE Journal Name Cloud Monitor as Winner in the Cybersecurity Risk Management Category BOULDER, Colo.—December 15, 2025—ManagedMethods, the leading provider of cybersecurity, safety, web filtering, and classroom ...

Against the Federal Moratorium on State-Level Regulation of AI

Cast your mind back to May of this year: Congress was in the throes of debate over the massive budget bill. Amidst the many seismic provisions, Senator Ted Cruz dropped a ticking time bomb of tech policy: a ten-year moratorium on the ability of ...

BEC: Explaining Business Email Compromise

Learn what Business Email Compromise (BEC) is, how to spot common scams, respond to attacks, and use SPF, DKIM, and DMARC to prevent future fraud. The post BEC: Explaining Business Email Compromise appeared first on Security Boulevard.

Soverli Raises $2.6 Million for Secure Smartphone OS

The sovereign smartphone OS runs along Android or iOS, allowing users to switch between secure, isolated environments. The post Soverli Raises $2.6 Million for Secure Smartphone OS appeared first on SecurityWeek.

Atlassian Patches Critical Apache Tika Flaw

Atlassian has released software updates for Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira. The post Atlassian Patches Critical Apache Tika Flaw appeared first on SecurityWeek.

Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)

Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the release of these updates, Google fixed CVE-2025-14174 in the desktop ...

LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way

This is the third installment in our four-part 2025 Year-End Roundtable. In Part One, we explored how accountability got personal. In Part Two, we examined how regulatory mandates clashed with operational complexity. Part three of a four-part ...