Application Security News and Articles


Why Scamming Can’t Be Stopped—But It Can Be Managed

With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale. The post Why Scamming Can’t Be Stopped—But It Can Be ...

1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

A critical command execution vulnerability has been found by a researcher in Instantel Micromate monitoring units.  The post 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking appeared first on SecurityWeek.

Malwarebytes Scam Guard spots and avoids potential scams

Malwarebytes launched Scam Guard, an AI-powered digital safety companion that provides real-time feedback on scams, threats and malware alongside digital safety recommendations. Whether it’s a suspicious text, DM, email, image or link, Scam ...

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Silver Spring, Maryland, 3rd June 2025, CyberNewsWire The post Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities appeared first on Security Boulevard.

HYPR and HID: Converge Physical and Digital Access Control

Streamlining Security: HYPR and HID Merge Physical and Digital Access The notion of “access” no longer coincides with a single connotation. Within a sprawling landscape of digital identities and physical spaces, modern enterprises are ...

AttackIQ Ready3 identifies which vulnerabilities are truly exposed

AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform ...

Introducing Comprehensive Workload Identity and Access Management Across Microsoft Environments

5 min readWith Aembit, you can secure Microsoft workloads – wherever they run – using short-lived credentials, posture-aware policies, and no-code credential injection. The post Introducing Comprehensive Workload Identity and Access ...

Silobreaker’s AI widgets automate stakeholder-ready intelligence reporting

Silobreaker released AI Summarise for dashboards and email alerting. This latest enhancement brings the power of customisable AI directly into the core of the analyst workflow – enabling threat intelligence teams to generate stakeholder-ready ...

Zero Networks Raises $55 Million for Microsegmentation Solution

Microsegmentation provider Zero Networks has raised $55 million in a Series C funding round led by Highland Europe. The post Zero Networks Raises $55 Million for Microsegmentation Solution appeared first on SecurityWeek.

5 Practical Moves to Take Control of Cybersecurity Exposure

AttackIQ Ready3 turns recommendations into action with a built-in CTEM workflow that maps attack surfaces, validates exposures, and tracks risk in real time. With MITRE ATT&CK-aligned tests, extended discovery, and automated checks, security ...

MainStreet Bank Data Breach Impacts Customer Payment Cards 

The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancshares’ customers. The post MainStreet Bank Data Breach Impacts Customer Payment Cards  appeared first on SecurityWeek.

Posture ≠ Protection

CSPM, DSPM, ASPM, SSPM, ESPM — the alphabet soup of Security Posture Management (SPM) tools promises visibility into risk. They map misconfigurations, surface exposure paths and highlight policy gaps. That can be useful. But let’s not confuse ...

Over 30 Vulnerabilities Patched in Android

The latest Android updates fix vulnerabilities in Runtime, Framework, System, and third-party components of the mobile OS. The post Over 30 Vulnerabilities Patched in Android appeared first on SecurityWeek.

Photos: Infosecurity Europe 2025

Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is on-site and here’s a closer look at the conference. The featured vendors are: Okta, PlexTrac, ISC2, Insight, EasyDMARC, ...

Interlock and the Kettering Ransomware Attack: ClickFix’s Persistence

In healthcare, every minute of downtime isn’t just a technical problem — it’s a patient safety risk. CNN recently reported that Kettering Health, a major hospital network in Ohio, was hit by a ransomware attack. According to CNN, the ...

Akamai launches DNS Posture Management for real-time monitoring and guided remediation

Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The agentless solution provides real-time monitoring and guided remediation across all major DNS ...

RSA enhances passwordless identity platform

RSA announced a new Identity Security Posture Management (ISPM) and enhancements to its passwordless identity platform. These innovations will help enterprises proactively find and resolve security risks across hybrid and cloud environments and ...

Australia Enforces Ransomware Payment Reporting

Covered organizations in Australia are now required to report ransomware and other cyber extortion payments within three days. The post Australia Enforces Ransomware Payment Reporting appeared first on SecurityWeek.

Implementing Comprehensive SAST Security Scanning in GitLab CI/CD with Jenkins Integration

🔧 Automate SAST DAST in GitLab CI/CD with Jenkins pipelines. Export results to DefectDojo for easy tracking and faster remediation.Continue reading on Medium »

ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the ...