Application Security News and Articles


Early reporting helps credit unions stop fraudulent transfers faster

In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and strengthening payment security. As cybercriminals leverage social engineering and ...

Product showcase: Syteca – The human-centric insider threat management platform

Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data Breach Investigation Report, 60% of breaches involve the human element. The real risk often ...

Scammers target international students by threatening their visa status

In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university ...

Proximity: Open-source MCP security scanner

Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available, and it can evaluate how those elements might introduce security risks. The tool ...

MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?

This morning, I tried to power down my Samsung S23 smartphone. Related: Sam Altman seeks to replace the browser I long-pressed the side key expecting the usual “Power off / Restart” menu. Instead, a small Gemini prompt window appeared towards ...

Check Point Allies with NVIDIA to Secure AI Platforms

Check Point Software Technologies Ltd. today revealed it has developed a cybersecurity platform to secure artificial intelligence (AI) factories in collaboration with NVIDIA. Announced at the NVIDIA GTC conference, the AI Cloud Protect platform ...

When the Patches Stop: Protecting Your (Windows 10) Environment with CDR

The post When the Patches Stop: Protecting Your (Windows 10) Environment with CDR appeared first on Votiro. The post When the Patches Stop: Protecting Your (Windows 10) Environment with CDR appeared first on Security Boulevard.

NDSS 2025 – Secure IP Address Allocation At Cloud Scale Session 1B: Internet Security

Authors, Creators & Presenters: Eric Pauley (University of Wisconsin--Madison), Kyle Domico (University of Wisconsin--Madison), Blaine Hoak (University of Wisconsin--Madison), Ryan Sheatsley (University of Wisconsin--Madison), Quinn Burke ...

Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up

Witnesses on the Thai side of the border reported hearing explosions and seeing smoke coming from the center over the past several nights starting on Friday. The post Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as ...

CVE-2025-62725: From “docker compose ps” to System Compromise

Docker Compose powers millions of workflows, from CI/CD runners and local development stacks to cloud workspaces and enterprise build pipelines. It’s trusted by developers as the friendly layer above Docker Engine that turns a few YAML lines ...

PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)

A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially ...

Agentic Commerce Is Here. Is Your Business Ready to Accept AI-Driven Transactions?

Agentic commerce is here. See how AI-driven checkout reshapes fraud, attribution, and upsell motions, and how DataDome secures MCP, APIs, and helps you monetize trusted AI traffic. The post Agentic Commerce Is Here. Is Your Business Ready to ...

Ultimate Guide to Open Source Security: Risks, Attacks & Defenses

Explore top risks and proven open source security strategies. The post Ultimate Guide to Open Source Security: Risks, Attacks & Defenses appeared first on Security Boulevard.

PyTorch tensors, neural networks and Autograd: an introduction

This guide is designed to demystify PyTorch's core components, providing you with a solid understanding of how it empowers the creation and training of sophisticated machine learning models. The post PyTorch tensors, neural networks and Autograd: ...

Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD

As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce ...

NDSS 2025 – CHAOS: Exploiting Station Time Synchronization in 802.11 Networks

Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially ...

Censys delivers internet intelligence to accelerate SOC triage and response

Censys announced a new offering designed to help SOC teams accelerate alert triage, reduce mean time to triage (MTTT), and accelerate incident response. The offering delivers near real-time and historical visibility into all internet-facing ...

QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability

The critical-severity flaw allows attackers to smuggle HTTP requests and access sensitive data, modify server files, or cause DoS conditions. The post QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability appeared first on SecurityWeek.

Critical Microsoft WSUS Security Flaw is Being Actively Exploited

A critical security flaw in Microsoft's WSUS feature is being actively exploited in the wild by threat actors who could gain access into unpatched servers, remotely control networks, and use them to deliver malware or do other damage. Microsoft ...

Cobalt transforms ad-hoc security testing into a continuous, managed program

Cobalt has undergone a large-scale expansion of its Cobalt Offensive Security Platform to transform offensive security from ad-hoc tests into a continuous, centrally managed program. The human led, AI-powered platform provides the visibility, ...