Application Security News and Articles


Which frameworks assist in ensuring compliance for NHIs?

Why Compliance Frameworks are Crucial for NHIs? Could the answer to your organization’s cybersecurity woes lie in Non-Human Identities (NHIs)? The management of NHIs and their secrets has emerged as a key facet of cybersecurity strategy, with ...

Generative AI: threat or opportunity? It depends on your adaptive speed!

Now that AI reasoning capabilities are blasting and becoming accessible, folks tend to argue that generative AI will bring us a new era of exploitation. More zero days, more vulnerabilities, more sophisticated, and in higher frequency. The ...

Broadcom Extends Scope of VMware vDefend Cybersecurity Platform

Broadcom today updated its VMware vDefend platform to add additional security intelligence capabilities along with a streamlined ability to micro-segment networks using code to programmatically deploy virtual firewalls. Additionally, Broadcom has ...

MailChimp Under Attack: How Cybercriminals Are Exploiting Email Marketing Platforms

At Constella, we’ve spent years analyzing how cybercriminals execute attacks that affect organizations of all sizes, whether they’re startups, local businesses, or global enterprises. One of the most revealing recent cases involves the abuse ...

OpenAI Offering $100K Bounties for Critical Vulnerabilities

OpenAI has raised its maximum bug bounty payout to $100,000 (up from $20,000) for high-impact flaws in its infrastructure and products. The post OpenAI Offering $100K Bounties for Critical Vulnerabilities appeared first on SecurityWeek.

BSidesLV24 – IATC – Difficult Conversations

Author/Presenter: Andrea M. Matwyshyn Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

ADAMnetworks Licensed Technology Partner (LTP) Program

ADAMnetworks Licensed Technology Partner (LTP) Program Empowering MSPs, MSSPs & MDR Providers with Next-Gen Zero Trust Security In today’s threat-filled digital landscape, reactive cybersecurity isn’t enough. Businesses, governments, ...

SAST vs. DAST: Bridging the Gap in Application Security Testing

This article explores the key differences between SAST and DAST, their advantages and limitations, and how organizations can bridge the…Continue reading on Medium »

Snow White — Beware the Bad Apple in the Torrent 

As the new Snow White movie arrives in theaters with lackluster audience attendance (source), the absence of streaming options on platforms like Disney+ has nudged many users to seek pirated versions online.  From our perspective, this kind of ...

The Rise of Mobile Phishing and How to Prevent Mobile Phishing

The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on AI Security Automation. The post The Rise of Mobile Phishing and How to Prevent Mobile Phishing appeared first on Security Boulevard.

Introducing the Mend.io Value Dashboard: Measure and Showcase Your Security Impact

Track, measure, and prove your AppSec impact with the Mend.io Value Dashboard. The post Introducing the Mend.io Value Dashboard: Measure and Showcase Your Security Impact appeared first on Security Boulevard.

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #330 — AI For Job Hunting

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Russian Ransomware Gang Exploited Windows Zero-Day Before Patch

Exploitation of Windows MMC zero-day is being pinned on a ransomware gang known as EncryptHub (an affiliate of RansomHub) The post Russian Ransomware Gang Exploited Windows Zero-Day Before Patch appeared first on SecurityWeek.

Oracle Breach: The Impact is Bigger Than You Think | Grip

Learn how the Oracle breach amplifies your risk from rogue cloud tenants plus how Grip helps organizations detect exposure and respond fast to mitigate risks. The post Oracle Breach: The Impact is Bigger Than You Think | Grip appeared first on ...

Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

Recently, two critical security flaws were discovered in Kentico Xperience 13, a popular digital experience platform (CMS). Tracked as CVE-2025-2746 and CVE-2025-2747, these vulnerabilities allow unauthenticated attackers to bypass the Staging ...

AMTSO Releases Sandbox Evaluation Framework

AMTSO has developed a Sandbox Evaluation Framework to standardize the testing of malware analysis solutions.  The post AMTSO Releases Sandbox Evaluation Framework appeared first on SecurityWeek.

CoffeeLoader: A Brew of Stealthy Techniques

IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading ...

Enemies with benefits: RansomHub and rival gangs share EDRKillShifter tool

ESET researchers have published an in-depth analysis highlighting significant shifts within the ransomware landscape, spotlighting the rise of RansomHub. This relatively new ransomware-as-a-service operation has quickly come to dominate the ...

China-linked FamousSparrow APT group resurfaces with enhanced capabilities

ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector. While helping the affected entity remediate the compromise, they made an unexpected discovery in the victim’s ...

BSidesLV24 – IATC – Hungry, Hungry Hackers

Authors/Presenters: Sick.Codes, Casey John Ellis Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...