Application Security News and Articles


Getting the Most Value Out of the OSCP: After the Exam

In the final post of this series, I’ll discuss what to do after your latest exam attempt to get the most value out of your OSCP journey. DISCLAIMER: All opinions expressed in this article are solely my own. I have reviewed the content to ...

Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure

Cryptocurrency mining operation hits exposed Consul dashboards, Docker Engine APIs and Gitea code-hosting instances to push Monero miner. The post Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure appeared first on SecurityWeek.

OffensiveCon25 – Hunting For Overlooked Cookies In Windows 11 KTM And Baking Exploits For Them

Authors/Presenters: Cedric Halbronn and Jael Koh Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently

Chipmaker says there are indications from Google Threat Analysis Group that a trio of flaws “may be under limited, targeted exploitation.” The post Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently appeared first ...

Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps

Sysdig today disclosed an example of how a tool for training artificial intelligence (AI) models was compromised by a cyberattack that led to the injection of malicious code and the downloading of cryptominers. The Sysdig Threat Research Team ...

BarracudaONE boosts threat protection and cyber resilience

Barracuda Networks unveiled the BarracudaONE AI-powered cybersecurity platform. BarracudaONE maximizes threat protection and cyber resilience by unifying layered security defenses and providing deep, intelligent threat detection and response for ...

Monster Mitigates Malicious Traffic & Fake Accounts with DataDome’s AI-Powered Protection

By eliminating click fraud, blocking job scrapers, stopping fake accounts, and reducing DevOps workload, Monster safeguarded its revenue, improved the platform’s integrity, and freed up engineering resources thanks to DataDome The post Monster ...

Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide

Critical Linux vulnerabilities that expose password hashes on millions of systems. Learn how to protect your data now! The post Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide appeared first on Security Boulevard.

Google Launches AI Edge Gallery App for Local AI Model Execution

Google AI Edge Gallery app, enabling on-device AI processing for enhanced privacy and performance. Try it today! The post Google Launches AI Edge Gallery App for Local AI Model Execution appeared first on Security Boulevard.

AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft

Ukraine's AI-powered FPV drones redefine warfare, featuring advancements in military technology and cost-effective strategies. Learn more! The post AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft appeared first on Security ...

DoControl helps organizations enforce zero trust security strategies

DoControl announced expanded capabilities that further support organizations in enforcing zero trust security strategies – without compromising business agility or user productivity. Zero trust principles dictate that no user, device, or ...

vBulletin Vulnerability Exploited in the Wild

Exploitation of the vBulletin vulnerability tracked as CVE-2025-48827 and CVE-2025-48828 started shortly after disclosure. The post vBulletin Vulnerability Exploited in the Wild appeared first on SecurityWeek.

How Artificial Intelligence Phishing Detection Is Reshaping K–12 Email Protection

Using Artificial Intelligence Phishing Detection to Outsmart Today’s Email Threats in K–12 Phishing emails are no longer riddled with spelling mistakes and shady links. Today’s threats are socially engineered, personalized, and increasingly ...

Java 25 Launches Stable Values API for Enhanced Immutability

The new Stable Values API in JDK 25, enhancing performance with deferred immutability. Learn how it optimizes application startup now! The post Java 25 Launches Stable Values API for Enhanced Immutability appeared first on Security Boulevard.

Visual Studio 2022 v17.14: New Agent Mode and Copilot Features

The powerful enhancements in Visual Studio 2022 v17.14, including GitHub Copilot's new agent mode to boost developer productivity. Learn more! The post Visual Studio 2022 v17.14: New Agent Mode and Copilot Features appeared first on Security ...

Enhancing Kubernetes Security with AI-Powered Intrusion Detection

How AI and machine learning can enhance Kubernetes security. Learn about eBPF, IDS, and automated threat responses. Secure your environment today! The post Enhancing Kubernetes Security with AI-Powered Intrusion Detection appeared first on ...

NinjaTech and AWS Unveil Next-Gen AI Assistant for Productivity

NinjaTech AI's new personal assistant, Ninja, powered by AWS. Boost your productivity with advanced AI features. Try it today! The post NinjaTech and AWS Unveil Next-Gen AI Assistant for Productivity appeared first on Security Boulevard.

Microsoft Invests $400 Million in Switzerland for AI and Cloud

Microsoft invests $400M in Swiss AI and cloud infrastructure, enhancing data security and job training. Discover how this impacts local economy! The post Microsoft Invests $400 Million in Switzerland for AI and Cloud appeared first on Security ...

Microsoft Open Sources GitHub Copilot: A New Era for AI Coding

Microsoft opens the GitHub Copilot Chat extension under the MIT license, revolutionizing AI coding tools. Learn more about this game-changing move! The post Microsoft Open Sources GitHub Copilot: A New Era for AI Coding appeared first on Security ...

New Tools and Initiatives in Data Breach Monitoring and Healthcare AI

Latest updates on cyber security, AI health initiatives, and pandemic preparedness. Stay informed and take action today! The post New Tools and Initiatives in Data Breach Monitoring and Healthcare AI appeared first on Security Boulevard.