Application Security News and Articles


Cyber Risk in Real Time: Lessons from the Front Lines

Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink cybersecurity in terms of measurable risk rather than endless checklists and compliance frameworks. Boyle, a ...

In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution

Other noteworthy stories that might have slipped under the radar: several interesting Android malware families, UN cybercrime treaty, criminal complaint against Clearview AI in Europe. The post In Other News: WhatsApp Passkey-Encrypted Backups, ...

Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)

A Windows vulnerability (CVE-2025-9491, aka ZDI-CAN-25373) that state-sponsored threat actors and cybercrime groups have been quietly leveraging since at least 2017 continues to be exploited for attacks. “Arctic Wolf Labs assesses with high ...

What is the Agent Payments Protocol (AP2) and How Does It Work?

An amazing post The post What is the Agent Payments Protocol (AP2) and How Does It Work? appeared first on Security Boulevard.

Stateless Authentication: Understanding Token-Based Auth

An amazing post The post Stateless Authentication: Understanding Token-Based Auth appeared first on Security Boulevard.

NDSS 2025 – Exploring User Perceptions Of Security Auditing In The Web3 Ecosystem

SESSION Session 1C: Privacy & Usability 1 Authors, Creators & Presenters: Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of ...

FCC Chair Carr Looks to Eliminate Telecom Cybersecurity Ruling

FCC Chair Brendan Carr said the agency will look to eliminate a declaratory ruling made by his predecessor that aimed to give the government more power to force carriers to strengthen the security of their networks in the wake of the widespread ...

Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are Powering 2026’s Next Wave

Every healthcare CEO and CTO is asking the same question in 2025 and for 2026, “Can I trust what my AI just told me?” Artificial...Read More The post Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are ...

Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges

Oleksii Oleksiyovych Lytvynenko is now in the US after being held in custody in Ireland since 2023. The post Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges appeared first on SecurityWeek.

Transnational Organized Crime Gang Steals $1 Million from Ontario Couple

Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly.  It starts with the headlines. CTVNews:  Ontario seniors GIVE AWAY MORE THAN ...

Enterprise Vulnerability Management: A Comprehensive Guide

Learn about enterprise vulnerability management, its components, challenges, and best practices for Enterprise SSO, Enterprise Ready, and CIAM environments. Enhance your organization's security posture. The post Enterprise Vulnerability ...

Tonic.ai product updates: October 2025

Announcing the Fabricate Data Agent, synthetic data generation via agentic AI. Plus, Structural's Custom Categorical is now AI-assisted, and Model-based Custom Entities are coming to Textual! The post Tonic.ai product updates: October 2025 ...

Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness

Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, ...

Open VSX Downplays Impact From GlassWorm Campaign

Open VSX fully contained the GlassWorm attacks and says it was not a self-replicating worm in the traditional sense. The post Open VSX Downplays Impact From GlassWorm Campaign appeared first on SecurityWeek.

CISA and partners take action as Microsoft Exchange security risks mount

In partnership with international cybersecurity agencies, the US Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) outlined security best practices for organizations that use on-premises versions of ...

The Top 8 Cyber Risk Assessment Tools and Solutions

Cyber risk assessment is the heart of modern cyber risk management. In 2025, as enterprises face AI-driven attacks, record ransomware volumes, and regulators demanding operational resilience, the ability to assess cyber risks in business and ...

Will AI Strengthen or Undermine Democracy?

Listen to the Audio on NextBigIdeaClub.com Below, co-authors Bruce Schneier and Nathan E. Sanders share five key insights from their new book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship. What’s the big ...

When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us

Wallarm’s latest Q3 2025 API ThreatStats report [link placeholder] reveals that API vulnerabilities, exploits, and breaches are not just increasing; they’re evolving.  Malicious actors are shifting from code-level weaknesses to business ...

CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog

Broadcom has updated its advisory on CVE-2025-41244 to mention the vulnerability’s in-the-wild exploitation. The post CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog appeared first on SecurityWeek.

The Privacy Paradox: Balancing Employee Monitoring and Secure Authentication

Discover how to balance employee monitoring and privacy using transparent oversight and passwordless authentication tools like MojoAuth. The post The Privacy Paradox: Balancing Employee Monitoring and Secure Authentication appeared first on ...