Application Security News and Articles


Adapting to New Cybersecurity Challenges with NHIs

Are Your Machine Identities Truly Secure in the Cloud Ecosystem? With organizations strive to protect their digital assets, one critical yet sometimes overlooked area is the management of Non-Human Identities (NHIs) and Secrets Security ...

Staying Ahead of Threats with Smart NHIs

How Can Smart NHI Management Enhance Cybersecurity? Managing Non-Human Identities (NHIs) may seem like an abstract task, yet its significance in bolstering cybersecurity cannot be overstated. With the shift towards digital transformation, NHIs ...

Relieving Stress in Cloud Compliance: How NHIs Help

Can Understanding Non-Human Identities (NHIs) Really Help Relieve Cloud Compliance Stress? Navigating the complexities of cloud compliance can often feel overwhelming for organizations across various sectors. With the growing adoption of cloud ...

Securing Agentic AI: Extending Network Security Principles to Serverless Environments

As enterprise AI rapidly matures, we’re entering a new phase, one powered by agentic AI. These intelligent agents are more autonomous, capable of making decisions, taking actions, and adapting dynamically to new environments. This evolution ...

NDSS 2025 – The Philosopher’s Stone: Trojaning Plugins Of Large Language Models

SESSION Session 2A: LLM Security Authors, Creators & Presenters: Tian Dong (Shanghai Jiao Tong University), Minhui Xue (CSIRO's Data61), Guoxing Chen (Shanghai Jiao Tong University), Rayne Holland (CSIRO's Data61), Yan Meng (Shanghai Jiao ...

News alert: Insider risk report finds behavioral blind spots leave most orgs exposed, confidence low

BALTIMORE, Nov. 4, 2025, CyberNewswire — he new 2025 Insider Risk Report, produced by Cybersecurity Insiders in collaboration with Cogility, highlights that nearly all security leaders (93%) say insider threats are as difficult or harder to ...

MITRE v18 Update

We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v18 version of MITRE ATT&CK®!  The post MITRE v18 Update appeared first on Security Boulevard.

Why Israel Just Banned 700 Chinese Cars from Its Military—And What It Means for Security

In early November, the Israeli Defense Forces made a decision that sent ripples through defense and cybersecurity circles worldwide: withdraw every Chinese-manufactured vehicle from its senior officer fleet. The IDF marked approximately 700 cars, ...

Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security

Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance ...

Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks

Arbitrary command/code execution has been demonstrated through the exploitation of CVE-2025-11953 on Windows, macOS and Linux.  The post Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks appeared first on SecurityWeek.

Ollama Remote Code Execution: Securing the Code That Runs LLMs

Our Vulnerability Researchers uncovered vulnerabilities in the code of Ollama, a popular tool to run LLMs locally. Dive into the details of how LLMs are implemented and what can go wrong. The post Ollama Remote Code Execution: Securing the Code ...

NDSS 2025 – Oreo: Protecting ASLR Against Micro-Architectural Attacks

SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan (Massachusetts Institute of ...

Cybercriminals exploit RMM tools to steal real-world cargo

Cybercriminals are compromising logistics and trucking companies by tricking them into installing remote monitoring and management (RMM) tools, Proofpoint researchers warned. The attackers’ end goal is to hijack freight shipments and sell the ...

Delinea Platform now available to IBM customers through expanded partnership

Delinea has announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers. This new agreement deepens a strategic collaboration that began between the two companies in 2018. The Delinea ...

The Usual Suspects: 9 Dangerous File Types Every CISO Should Know

The post The Usual Suspects: 9 Dangerous File Types Every CISO Should Know appeared first on Votiro. The post The Usual Suspects: 9 Dangerous File Types Every CISO Should Know appeared first on Security Boulevard.

Transportation Companies Hacked to Steal Cargo

Threat actors engage in elaborate attack chains to infect trucking and logistics companies with remote access tools. The post Transportation Companies Hacked to Steal Cargo appeared first on SecurityWeek.

DefectDojo unveils Sensei, an AI-powered cybersecurity consultant

DefectDojo has announced DefectDojo Sensei, an AI agent designed to serve as the ultimate cybersecurity consultant. Sensei is the first super-intelligent agent of its kind in cybersecurity, leveraging self-training evolution algorithms to deliver ...

CyberArk launches Secure AI Agents to safeguard privileged AI identities

CyberArk is announcing the general availability of the CyberArk Secure AI Agents Solution, expanding the CyberArk Identity Security Platform with privilege controls to secure the rapidly growing class of AI agent identities. As organizations ...

Denmark’s Digital Defense 2025: AI Security Cutting Cyber Losses by Billions

Executive Snapshot Denmark stands among Europe’s most digital and connected economies – but that very strength has created one of the continent’s widest attack surfaces.With 92% of Danish organizations now running on cloud infrastructure ...

The Real Cost of Cryptojacking 

Cryptojacking silently hijacks compute power, inflates cloud bills, and erodes performance. Beyond financial losses, it exposes deep security risks, damages reputation, and drains productivity—making proactive detection and prevention essential ...