Application Security News and Articles


Tonic Validate is now on GitHub Marketplace! (Part 2)

Tonic Validate is a free, open-source library for evaluating RAG and LLM based applications. We recently announced a new listing on GitHub Marketplace that provides a GitHub Actions template to run Tonic Validate against code changes on every ...

Tonic Validate is now available on GitHub Marketplace!

Tonic Validate, our free, open-source library for evaluating RAG and LLM-based applications, can be run entirely as a GitHub Action. And it's now available for quick deployment on GitHub Marketplace! The post Tonic Validate is now available on ...

Tonic.ai Achieves HIPAA Compliance Certification, Ensuring Enhanced Security for Protected Health Information

We are proud to announce that we have successfully completed our HIPAA certification, marking a significant milestone in our commitment to data security and privacy. This achievement underscores our dedication to providing secure data ...

Steam Phishing: popular as ever

A month or so ago a friend of mine received the following message on Steam from someone in their Friends list (they were already friends): Figure 1 - 'this is for you'                                The two links are ...

CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin

Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity ...

Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025

Imagine if every doctor had an invisible assistant, one that quietly listens during every patient interaction, captures every detail with precision, and instantly writes the...Read More The post Top 7 Ambient Listening AI Tools Revolutionizing ...

LinuxFest Northwest: The Intersectionality Of Human Psychology, Security And The Era Of AI And Misinfo

Author/Presenter: Autumn Nash (Product Manager At Microsoft, Specializing In Linux Security Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the ...

JavaScript Protector Pro: The Ultimate Tool to Obfuscate & Secure Your JavaScript Code

In today’s digital age, JavaScript is everywhere — powering everything from sleek single-page applications to complex web dashboards. But…Continue reading on Medium »

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer. The post In Other News: Viasat Hacked by China, Washington Post ...

Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds

Check out highlights from Tenable’s “2025 Cloud Security Risk Report,” which delves into the critical risk from insecure cloud configurations. Plus, Google reveals a Russia-sponsored social engineering campaign that targeted prominent ...

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds. The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.

Your SOC Doesn’t Need More Alerts – It Needs a Brain

The phrase “alert fatigue” has become a mainstay in cybersecurity conversations. But behind the flood of findings, alerts, vulnerabilities, and compliance gaps lies a deeper problem: the security context crisis. Security teams aren’t just ...

Microsoft boosts default security of Windows 365 Cloud PCs

Windows 365 Cloud PCs now come with new default settings aimed at preventing / minimizing data exfiltration and malicious exploits, Microsoft has announced. Windows 365 Cloud PCs are Azure (i.e., Windows 365 service)-hosted virtual Windows PCs ...

Godfather Android Trojan Creates Sandbox on Infected Devices

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.

Motors Theme Vulnerability Exploited to Hack WordPress Websites

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords. The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek.

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit. The post FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks appeared first on SecurityWeek.

DuckDuckGo’s Scam Blocker now blocks more types of scams

Online scams are getting worse and more varied. DuckDuckGo knows that, so they’ve made changes. Their built-in Scam Blocker now stops more kinds of scam sites, all without tracking you. How Scam Blocker works (Source: DuckDuckGo) “If you ...

Cloudflare Tunnels Abused in New Malware Campaign

A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain. The post Cloudflare Tunnels Abused in New Malware Campaign appeared first on SecurityWeek.

Is Your CISO Ready to Flee? 

Companies with $1 billion in revenue or less might want to give a heads-up to HR to kickstart the search for a new CISO — because according to a study from IANS Research, your current CISO might be out the door within a year.  The 363 CISOs in ...

161,000 People Impacted by Krispy Kreme Data Breach

Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024.  The post 161,000 People Impacted by Krispy Kreme Data Breach appeared first on SecurityWeek.