Application Security News and Articles
As students head back to school, Contrast Security customers are getting ready for more sophisticated cyberattacks. Dark Reading published a feature on the growing risks facing K-12 schools.
The post Cyber Threat Protection for K-12 Schools | ...
Unit21 has launched its Build Your Own Agent (BYOA) for banks, credit unions, and fintechs. The product enables risk and compliance teams to automate fraud and AML tasks, turning hours of manual data gathering, sorting and sifting into just ...
Qwiet AI has unveiled updates to its application security platform. These updates, which include expanded integrations across Azure DevOps, Azure Boards, and GitHub, and the introduction of new AI-powered AutoFix capabilities and an enhanced user ...
Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide.
The post Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime appeared first on SecurityWeek.
Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies.
The post Citrix Patches Exploited NetScaler Zero-Day appeared first on SecurityWeek.
Proof-of-concept ransomware uses AI models to generate attack scripts in real time.
The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek.
Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which Plex has issued a fix for earlier this month, Censys has warned. About CVE-2025-34158 Plex Media Server ...
Nice indirect prompt injection attack:
Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks ...
Seceon’s AI/ML and Dynamic Threat Modeling (DTM) powered cybersecurity solutions are designed to close this gap, providing enterprises and Managed Security Service Providers (MSSPs) with an intelligent, automated, and cost-effective way to ...
Nisos
Executive Dark Web Exposure: Protecting your Leadership
Not long ago, a Social Security number (SSN) felt like a vault key. Private, protected, rarely seen. Today, it’s more like currency...
The post Executive Dark Web Exposure: ...
Learn how to choose the right technology stack for your web app. Ensure scalability, performance, and long-term growth with expert guidance.
The post Choosing the Right Technology Stack for Your Web Application appeared first on Security Boulevard.
This is the fifth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in July's report, our goal is to equip security and anti-fraud teams with greater visibility into the email infrastructure ...
Learn why API testing is essential for performance, security, and reliability. Detect bugs early and boost your app’s quality.
The post The Importance Of Ensuring Robust APIs For Your Applications Through Testing appeared first on Security ...
AI-powered CIAM is heralding a new era for customer identity and access management in the retail industry. By blending the strengths of machine learning with th
The post AI-Powered CIAM in Retail: The Next Frontier of Customer Identity appeared ...
A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first step. The real risk comes from how quickly one weakness in an AI system ...
AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new rules, businesses cannot sit back and wait. In this Help Net Security interview, Matt Hillary, CISO at Drata, look ...
Network visibility – the real-time ability to monitor and understand data flows and activity across your digital infrastructure—is more than a security tool; it’s your lens into detecting stealthy threats, optimizing performance, and making ...
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source AI-driven system detects and patches vulnerabilities Buttercup ...
Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create multi-channel simulations that mirror how attackers operate across ...
Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate ...