Application Security News and Articles


UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks

ASRock, Asus, Gigabyte, and MSI motherboards are vulnerable to early-boot DMA attacks. The post UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks appeared first on SecurityWeek.

Crypto theft in 2025: North Korean hackers continue to dominate

When they strike cryptocurrency-related targets, North Korean hacking groups are increasingly aiming for large services where a single breach can move serious money, a new Chainalysis report on crypto theft in 2025 revealed. “North Korean ...

MCP vs. Traditional API Security: Key Differences

6 min readSecuring MCP requires a fundamentally different approach than traditional API security. The post MCP vs. Traditional API Security: Key Differences appeared first on Aembit. The post MCP vs. Traditional API Security: Key Differences ...

HPE Patches Critical Flaw in IT Infrastructure Management Software

Tracked as CVE-2025-37164, the critical flaw could allow unauthenticated, remote attackers to execute arbitrary code. The post HPE Patches Critical Flaw in IT Infrastructure Management Software appeared first on SecurityWeek.

Identity Over Network: Why 2026 Zero Trust Is About Who/What, Not Where

5 min readTrue zero trust requires verified identity at every request and eliminating static credentials entirely. The post Identity Over Network: Why 2026 Zero Trust Is About Who/What, Not Where appeared first on Aembit. The post Identity Over ...

Apiiro unveils AI SAST built on deep code analysis to eliminate false positives

Apiiro introduced Apiiro AI SAST, a new approach to static application security testing (SAST) that automates code risk detection, validation and fixes with the precision and cognitive process of an expert application security engineer. Grounded ...

The Power of Large Language Models for Cybersecurity 

Our dependence on digital infrastructure has grown exponentially amid unprecedented technological advancements. With this reliance comes an increasingly threatening landscape and expanding attack surfaces. As cyberthreats become more ...

Clipping Scripted Sparrow’s wings: Tracking a global phishing ring

Between June 2024 and December 2025, Fortra analysts tracked a persistent business email compromise (BEC) operation that we have now classified as Scripted Sparrow. The group carries out well-crafted highly targeted phishing campaigns that ...

AppGate extends zero trust to secure AI workloads with Agentic AI Core Protection

AppGate announced the launch of Agentic AI Core Protection, a new capability within AppGate ZTNA designed to secure AI workloads deployed in enterprise core environments across on-prem and cloud venues. This innovation enables organizations to ...

Microsoft 365 users targeted in device code phishing attacks

Attackers are targeting Microsoft 365 users with device code authorization phishing, a technique that fools users into approving access tokens, Proofpoint warns. The method abuses Microsoft’s OAuth 2.0 device authorization grant flow by ...

What the Latest OpenAI Security Breach Reveals About the State of AI Protection 

A recent OpenAI-related breach via third-party provider Mixpanel exposes how AI supply chain vulnerabilities enable phishing, impersonation, and regulatory risk—even without direct system compromise. The post What the Latest OpenAI ...

CISA Warns of Exploited Flaw in Asus Update Tool

Tracked as CVE-2025-59374, the issue is a software backdoor implanted in Asus Live Update in a supply chain attack. The post CISA Warns of Exploited Flaw in Asus Update Tool appeared first on SecurityWeek.

Making Sense of Complex Operations With Semantic Data

Semantic Operations The post Making Sense of Complex Operations With Semantic Data appeared first on Security Boulevard.

2025 Magic Quadrant for Email Security – What Gartner Said (and What it Means)

If you read my Buyers Look at More Than Dots piece after last year's Gartner Magic Quadrant, you know I'm not here to obsess over dot placement. The post 2025 Magic Quadrant for Email Security – What Gartner Said (and What it Means) ...

Self-Harm Prevention Kit Guide for Schools: Identifying Risks and Protecting Students

A self-harm prevention kit is becoming an essential part of school safety planning as student mental health challenges continue to rise across the United States. Schools are increasingly responsible for supporting the emotional well-being of ...

113,000 Impacted by Data Breach at Virginia Mental Health Authority

Threat actors stole names, Social Security numbers, and financial and health information, and deployed ransomware on RBHA’s systems. The post 113,000 Impacted by Data Breach at Virginia Mental Health Authority appeared first on SecurityWeek.

More than half of public vulnerabilities bypass leading WAFs

Miggo Security has released a new report that examines how web application firewalls are used across real-world security programs. The research outlines the role WAFs play as foundational infrastructure and evaluates their effectiveness against ...

2025 Federal Retrospective: The Year of Resilient Innovation

Resiliency has been top of mind in 2025, and recent high-profile CVEs serve as holiday reminders that adversaries aren't slowing down. But what changed this year was how the federal community responded. Increasingly, exploitability drove the ...

IoT Security Firm Exein Raises €100 Million

The Italian company has raised nearly $200 million in 2025 for its widely used embedded cybersecurity platform. The post IoT Security Firm Exein Raises €100 Million appeared first on SecurityWeek.

SSH vs SSL/TLS: Definitions & Differences of Communication Protocols

What is SSL/TLS? SSL and TLS are protocols used on the transport layer, which is used to provide a secure connection between two nodes in a computer network. The first widely used protocol that was aimed to secure the Internet connections was ...