Application Security News and Articles


Security for AI: How Shadow AI, Platform Risks, and Data Leakage Leave Your Organization Exposed

Your employees are using AI whether you’ve sanctioned it or not. And even if you’ve carefully vetted and approved an enterprise-grade AI platform, you’re still at risk of attacks and data leakage. Key takeaways: Security teams face three ...

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery

Google has also mentioned seeing React2Shell attacks conducted by Iranian threat actors. The post Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery appeared first on SecurityWeek.

The State of U.S. State and Local Government Cybersecurity (2024-2025): Why Unified AI Defense Is Now Essential

State, Local, Tribal, and Territorial (SLTT) governments operate the systems that keep American society functioning: 911 dispatch centers, water treatment plants, transportation networks, court systems, and public benefits portals. When these ...

Cloud Monitor Wins Cybersecurity Product of the Year 2025

Campus Technology & THE Journal Name Cloud Monitor as Winner in the Cybersecurity Risk Management Category BOULDER, Colo.—December 15, 2025—ManagedMethods, the leading provider of cybersecurity, safety, web filtering, and classroom ...

Against the Federal Moratorium on State-Level Regulation of AI

Cast your mind back to May of this year: Congress was in the throes of debate over the massive budget bill. Amidst the many seismic provisions, Senator Ted Cruz dropped a ticking time bomb of tech policy: a ten-year moratorium on the ability of ...

BEC: Explaining Business Email Compromise

Learn what Business Email Compromise (BEC) is, how to spot common scams, respond to attacks, and use SPF, DKIM, and DMARC to prevent future fraud. The post BEC: Explaining Business Email Compromise appeared first on Security Boulevard.

Soverli Raises $2.6 Million for Secure Smartphone OS

The sovereign smartphone OS runs along Android or iOS, allowing users to switch between secure, isolated environments. The post Soverli Raises $2.6 Million for Secure Smartphone OS appeared first on SecurityWeek.

Atlassian Patches Critical Apache Tika Flaw

Atlassian has released software updates for Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira. The post Atlassian Patches Critical Apache Tika Flaw appeared first on SecurityWeek.

Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)

Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the release of these updates, Google fixed CVE-2025-14174 in the desktop ...

LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way

This is the third installment in our four-part 2025 Year-End Roundtable. In Part One, we explored how accountability got personal. In Part Two, we examined how regulatory mandates clashed with operational complexity. Part three of a four-part ...

Compliance-Ready Cybersecurity for Finance and Healthcare: The Seceon Advantage

Navigating the Most Complex Regulatory Landscapes in Cybersecurity Financial services and healthcare organizations operate under the most stringent regulatory frameworks in existence. From HIPAA and PCI-DSS to GLBA, SOX, and emerging regulations ...

Third DraftKings Hacker Pleads Guilty

Nathan Austad admitted in court to launching a credential stuffing attack against a fantasy sports and betting website. The post Third DraftKings Hacker Pleads Guilty appeared first on SecurityWeek.

Managed Security Services 2.0: How MSPs & MSSPs Can Dominate the Cybersecurity Market in 2025

The cybersecurity battlefield has changed. Attackers are faster, more automated, and more persistent than ever. As businesses shift to cloud, remote work, SaaS, and distributed infrastructure, their security needs have outgrown traditional IT ...

Best Enterprise Data Solutions in 2025: Real-Time Foundations for AI at Scale

Explore the best enterprise data solutions powering real-time, governed, and scalable AI platforms across analytics, ML, and operations. The post Best Enterprise Data Solutions in 2025: Real-Time Foundations for AI at Scale appeared first on ...

700Credit Data Breach Impacts 5.8 Million Individuals

Hackers stole names, addresses, dates of birth, and Social Security numbers from the credit report and identity verification services provider. The post 700Credit Data Breach Impacts 5.8 Million Individuals appeared first on SecurityWeek.

Can Your AI Initiative Count on Your Data Strategy and Governance?

Launching an AI initiative without a robust data strategy and governance framework is a risk many organizations underestimate. Most AI projects often stall, deliver poor...Read More The post Can Your AI Initiative Count on Your Data Strategy and ...

Why Modern SaaS Platforms Are Switching to Passwordless Authentication

Learn why modern SaaS platforms are adopting passwordless authentication to improve security, user experience, and reduce breach risks. The post Why Modern SaaS Platforms Are Switching to Passwordless Authentication appeared first on Security ...

Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Apple has released macOS and iOS updates to patch two WebKit zero-days exploited in an “extremely sophisticated” attack. The post Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw appeared first on SecurityWeek.

Kali Linux 2025.4: New tools and “quality-of-life” improvements

OffSec has released Kali Linux 2025.4, a new version of its widely used penetration testing and digital forensics platform. Most of the changes are related to appearance and usability: Kali’s GNOME desktop environment now organizes Kali ...

Identity Risk Is Now the Front Door to Enterprise Breaches (and How Digital Risk Protection Stops It Early)

Most enterprise breaches no longer begin with a firewall failure or a missed patch. They begin with an exposed identity. Credentials harvested from infostealers. Employee logins are sold on criminal forums. Executive personas impersonated to ...