Application Security News and Articles


For $18 an Hour Stanford’s AI Agent Bested Most Human Pen Testers in Study 

A Stanford study finds the ARTEMIS AI agent beat most human pen testers in vulnerability discovery—at a fraction of the cost. The post For $18 an Hour Stanford’s AI Agent Bested Most Human Pen Testers in Study  appeared first on Security ...

In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee

Other noteworthy stories that might have slipped under the radar: Trump could use private firms for cyber offensive, China threat to US power grid, RaccoonO365 suspect arrested in Nigeria. The post In Other News: Docker AI Attack, Google Sues ...

NDSS 2025 – PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation

Session 6C: Sensor Attacks Authors, Creators & Presenters: Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang (Zhejiang University), Chenren Xu (Peking University), Wenyuan Xu ...

Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal

The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models. The post Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal appeared ...

AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding

The startup’s solution captures, verifies, and governs all AI interactions within an enterprise’s environment. The post AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding appeared first on SecurityWeek.

Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility

Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability. The post Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility appeared first ...

CSA Study: Mature AI Governance Translates Into Responsible AI Adoption

New CSA research shows mature AI governance accelerates responsible AI adoption, boosts security confidence, and enables agentic AI at scale. The post CSA Study: Mature AI Governance Translates Into Responsible AI Adoption appeared first on ...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm ...

Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

The hacking group has been using Group Policy to deploy cyberespionage tools on governmental networks. The post Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments appeared first on SecurityWeek.

Cybersecurity Snapshot: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say

Formerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt ...

CISO Spotlight: Lefteris Tzelepis on Leadership, Strategy, and the Modern Security Mandate

Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure to real-world attacks at the Greek Ministry of Defense to building and leading security programs inside complex enterprises, his career ...

Docker Makes 1,000 Hardened Images Free and Open Source

Millions of developers can now use the secure, production-ready images made by Docker. The post Docker Makes 1,000 Hardened Images Free and Open Source appeared first on SecurityWeek.

US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator

The exchange has been allegedly involved in laundering money for ransomware groups and other transnational cybercriminal organizations. The post US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator appeared first on SecurityWeek.

University of Sydney Data Breach Affects 27,000 Individuals 

Downloaded from a code library, the information pertains to current and former staff and affiliates, and to alumni and students. The post University of Sydney Data Breach Affects 27,000 Individuals  appeared first on SecurityWeek.

‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices

Linked to the Aisuru IoT botnet, Kimwolf was seen launching over 1.7 billion DDoS attack commands and increasing its C&C domain’s popularity. The post ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices appeared first on ...

The WAF must die – some interesting thoughts – FireTail Blog

Dec 19, 2025 - Jeremy Snyder - A recent posting by Dr. Chase Cunningham from Ericom Software on LinkedIn took an interesting view on web application firewalls, most commonly known as a WAF. WAF’s Must Die Like the Password and VPN’s Here at ...

FireTail’s 2022 Review on Macro, Industry, and Thoughts About What’s Next – FireTail Blog

Dec 19, 2025 - Jeremy Snyder - New beginnings, such as new years, provide a nice opportunity to look back at what we have just experienced, as well as look forward to what to expect. 2022 was a year of transition in many ways, and 2023 may well ...

How should Your Business Deal with Email Impersonation Attacks in 2025?

Originally published at How should Your Business Deal with Email Impersonation Attacks in 2025? by EasyDMARC. Email impersonation attacks have evolved rapidly with the ... The post How should Your Business Deal with Email Impersonation Attacks in ...

North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers

Data from Chainalysis and Amazon offers a glimpse into North Korea’s cyber activities surrounding cryptocurrency theft and fake IT workers. The post North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers ...

What is Spoofing and a Spoofing Attack? Types & Prevention

Originally published at What is Spoofing and a Spoofing Attack? Types & Prevention by EasyDMARC. Spoofing, in all its forms, makes up the ... The post What is Spoofing and a Spoofing Attack? Types & Prevention appeared first on ...