Application Security News and Articles


NinjaOne rolls out secure, compliant remote access for IT teams

NinjaOne announced NinjaOne Remote, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, ...

Resemble AI Raises $13 Million for AI Threat Detection

The cybersecurity startup will use the investment to accelerate product development and fuel global expansion. The post Resemble AI Raises $13 Million for AI Threat Detection appeared first on SecurityWeek.

Veza brings unified visibility and control to AI agents across the enterprise

Veza has launched AI Agent Security, a purpose-built product to help organizations secure and govern AI agents at enterprise scale. As businesses accelerate AI adoption, Veza is defining a new foundation for AI SPM by giving security and ...

Download: Evaluating Password Monitoring Vendors

Organizations using Active Directory must update their password policies to block and detect compromised passwords. However, comparing vendors in this area can be challenging. By asking the right questions, you can identify the right partner and ...

Tri-Century Eye Care Data Breach Impacts 200,000 Individuals

Tri-Century Eye Care was targeted recently by the Pear ransomware group, which claimed to have stolen over 3 Tb of data.  The post Tri-Century Eye Care Data Breach Impacts 200,000 Individuals appeared first on SecurityWeek.

Ransomware Payments Surpassed $4.5 Billion: US Treasury

Ransomware payments reached the highest level in 2023, at $1.1 billion paid in 1,512 reported incidents. The post Ransomware Payments Surpassed $4.5 Billion: US Treasury appeared first on SecurityWeek.

Critical Apache Tika Vulnerability Leads to XXE Injection

The bug allows attackers to carry out XML External Entity (XXE) injection attacks via crafted XFA files inside PDF files. The post Critical Apache Tika Vulnerability Leads to XXE Injection appeared first on SecurityWeek.

Cloudflare Forces Widespread Outage to Mitigate Exploitation of Maximum Severity Vulnerability in React2Shell 

A critical React2Shell (CVE-2025-55182) RCE flaw in React and Next.js is being actively exploited by China-nexus threat groups, prompting urgent patching and global mitigations. The post Cloudflare Forces Widespread Outage to Mitigate ...

Exploitation of React2Shell Surges

An increasing number of threat actors have been attempting to exploit the React vulnerability CVE-2025-55182 in their attacks. The post Exploitation of React2Shell Surges appeared first on SecurityWeek.

The Developer’s Shield: A Guide to Securing Source Code

Your concern is valid: in the absence of a dedicated security team, developers are the first, and often only, line of defense for the…Continue reading on Medium »

December 2025 Patch Tuesday forecast: And it’s a wrap

It’s hard to believe that we’re in December of 2025 already and the end of the year is fast approaching. Looking back on the year, there are two major items that really stand out in my mind. First, there is the large number of Microsoft ...

CISA Releases New AI-in-OT Security Guidance: Key Principles & Risks

CISA and global partners issue new guidance for secure AI integration in operational technology, highlighting risks, governance, behavioral analytics, and OT safety. The post CISA Releases New AI-in-OT Security Guidance: Key Principles & ...

NVIDIA research shows how agentic AI fails under attack

Enterprises are rushing to deploy agentic systems that plan, use tools, and make decisions with less human guidance than earlier AI models. This new class of systems also brings new kinds of risk that appear in the interactions between models, ...

The Bastion: Open-source access control for complex infrastructure

Operational teams know that access sprawl grows fast. Servers, virtual machines and network gear all need hands-on work and each new system adds more identities to manage. A bastion host tries to bring order to this problem. It acts as a single ...

How to tell if your password manager meets HIPAA expectations

Most healthcare organizations focus on encryption, network monitoring, and phishing prevention, although one simple source of risk still slips through the cracks. Password management continues to open doors for attackers more often than leaders ...

Invisible IT is becoming the next workplace priority

IT leaders want their employees to work without running into digital hurdles, but many still struggle with fragmented systems that slow teams down. A new report from Lenovo sheds light on how widespread the problem has become and what ...

Ex-Employee Sues Washington Post Over Oracle EBS-Related Data Breach

The Washington Post last month reported it was among a list of data breach victims of the Oracle EBS-related vulnerabilities, with a threat actor compromising the data of more than 9,700 former and current employees and contractors. Now, a ...

CISOs are spending big and still losing ground

Security leaders are entering another budget cycle with more money to work with, but many still feel no safer. A new benchmark study from Wiz shows a widening gap between investment and impact. Budgets keep rising, cloud programs keep expanding, ...

Week in review: React, Node.js flaw patched, ransomware intrusion exposes espionage foothold

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Creative cybersecurity strategies for resource-constrained institutions In this Help Net Security interview, Dennis Pickett, CISO at RTI ...

China Hackers Using Brickstorm Backdoor to Target Government, IT Entities

Chinese-sponsored groups are using the popular Brickstorm backdoor to access and gain persistence in government and tech firm networks, part of the ongoing effort by the PRC to establish long-term footholds in agency and critical infrastructure ...