Application Security News and Articles


Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit

A threat actor claims to offer a zero-day exploit for an unauthenticated remote code execution vulnerability in Fortinet firewalls. The post Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit appeared first on SecurityWeek.

New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations

Organizations in the healthcare and pharmaceutical sectors have been targeted with ResolverRAT, a new malware family with advanced capabilities. The post New ‘ResolverRAT’ Targeting Healthcare, Pharmaceutical Organizations appeared ...

Cycode Named in Gartner’s 2025 Market Guide for Software Supply Chain Security

We are proud to share that Cycode has been recognized as a Representative Vendor in the 2025 Gartner® Market Guide for Software Supply Chain Security (SSCS)... The post Cycode Named in Gartner’s 2025 Market Guide for Software Supply Chain ...

You Have Exposure Management Questions. We’ve Got Answers

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we feature the first Exposure Management Academy FAQ. We’ll ...

AI Hallucinations Create a New Software Supply Chain Threat

Researchers uncover new software supply chain threat from LLM-generated package hallucinations. The post AI Hallucinations Create a New Software Supply Chain Threat appeared first on SecurityWeek.

How Newport School District Strengthens Google Cybersecurity and Stops Threats Fast

Saving Time and Reducing Risk: The Benefits of Google Workspace Threat Detection for K-12 Schools Nestled in a small community in northeastern Washington, Newport School District serves approximately 1,100 students with a dedicated team of about ...

GRC for Building Customer Trust: A Strategic Imperative for Long-Term Success

In business, trust is a make-or-break factor. It’s what holds customer relationships together. And it’s the quiet force that determines whether someone clicks “buy” or walks away from your website.  So how do you gain it?  You need to ...

Package hallucination: LLMs may deliver malicious code to careless devs

LLMs’ tendency to “hallucinate” code packages that don’t exist could become the basis for a new type of supply chain attack dubbed “slopsquatting” (courtesy of Seth Larson, Security Developer-in-Residence at ...

Don’t Be Robotic About Your Robots’ Cybersecurity

If AI-powered robotics companies do not increase their investment in privacy and cybersecurity, they risk the promise of their innovations. The post Don’t Be Robotic About Your Robots’ Cybersecurity appeared first on Security Boulevard.

The future of digital security: 47-day certificate lifecycles are happening

The CA/B Forum’s approval of a 47-day maximum certificate lifespan marks a pivotal shift in digital security. While it presents operational challenges, it significantly strengthens online trust, drives automation, and reduces exposure to ...

Industry Moves for the week of April 14, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of April 14, 2025. Stay updated with the latest industry trends and shifts.

Malicious NPM Packages Target Cryptocurrency, PayPal Users

Threat actors are publishing malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. The post Malicious NPM Packages Target Cryptocurrency, PayPal Users appeared first on SecurityWeek.

Reasoning in the Age of Artificial Intelligence

Lately, I often hear people asking: “Will Artificial Intelligence replace my job?” Perhaps you’ve had this thought too. More than just a matter of the job market or salary expectations, this question challenges our role in society and our ...

Who Not How is the Smart Way to Bridge Expertise Gaps and Improve Your Odds of Success

A Shift in Thinking That Powers Growth We are in a world where speed, adaptability, and precision are paramount, businesses are faced with more complexity...Read More The post Who Not How is the Smart Way to Bridge Expertise Gaps and Improve Your ...

PlanetScale Vectors GA: A Game-Changer for MySQL and AI Databases

Latest advancements in database technology with PlanetScale Vectors, Google Cloud enhancements, AMD's GAIA, and more. Stay updated! The post PlanetScale Vectors GA: A Game-Changer for MySQL and AI Databases appeared first on Security Boulevard.

Netflix Tests OpenAI-Powered AI Search Tool for Easier Show Discovery

Discover how Netflix's new AI search engine enhances content discovery by allowing nuanced searches. Join the revolution today! The post Netflix Tests OpenAI-Powered AI Search Tool for Easier Show Discovery appeared first on Security Boulevard.

Anthropic Launches Claude: AI Chatbot for Higher Education

Discover Claude for Education, Anthropic's AI assistant designed for universities, promoting critical thinking and enhancing academic operations. Learn more! The post Anthropic Launches Claude: AI Chatbot for Higher Education appeared first on ...

Adaptive MFA: The Future of Dynamic Identity Security in 2025

Adaptive MFA is no longer optional—it’s a strategic imperative. By blending contextual intelligence with user-centric design, businesses can thwart cyber threats, comply with regulations, and foster trust in an increasingly digital world. The ...

The quiet data breach hiding in AI workflows

As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions. They are a natural outcome of how employees use large language models. CISOs cannot treat this as a secondary concern. ...

Tirreno: Open-source fraud prevention platform

Tirreno is an open-source fraud prevention platform designed as a universal analytics tool to monitor online platforms, web applications, SaaS products, digital communities, mobile apps, intranets, and e-commerce websites. “Our aim is to ...