Application Security News and Articles


ISO 27001 vs ISO 27002 Control Guidance Differences

Here on the Ignyte blog, we talk a lot about ISO 27001 as a valuable international framework for information security. We also frequently touch on two related documents: ISO 27002 and Annex A. As you may know, ISO/IEC, the organization ...

NDSS 2025 – Off-Path TCP Hijacking In Wi-Fi Networks: A Packet-Size Side Channel Attack

SESSION Session 1A: WiFi and Bluetooth Security PAPER Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack In this paper, we unveil a fundamental side channel in Wi-Fi networks, specifically the observable frame size, which ...

Middle East Cyber Resilience 2030: Unified Defense in a $26B Market

The Middle East is undergoing one of the fastest digital transformations in the world. National initiatives such as Saudi Vision 2030, Kuwait Vision 2035, and the UAE Digital Government Strategy are fueling large-scale modernization across every ...

Insider Threats Loom while Ransom Payment Rates Plummet

The percentage of companies choosing to pay ransoms dropped significantly, while threat actors shift their tactics in response to decreasing profits. The post Insider Threats Loom while Ransom Payment Rates Plummet appeared first on Security ...

Randall Munroe’s XKCD ‘’Ping”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Ping” appeared first on Security Boulevard.

NDSS 2025 – Symposium on Usable Security and Privacy (USEC) 2025 Afternoon, Paper Session 2

Authors, Creators & Presenters: PAPERS Understanding reCAPTCHAv2 via a Large-Scale Live User Study Andrew Searles (University of California Irvine), Renascence Tarafder Prapty (University of California Irvine), Gene Tsudik (University of ...

Critical Windows Server WSUS Vulnerability Exploited in the Wild 

CVE-2025-59287 allows a remote, unauthenticated attacker to execute arbitrary code and a PoC exploit is available. The post Critical Windows Server WSUS Vulnerability Exploited in the Wild  appeared first on SecurityWeek.

Hackers Target Perplexity Comet Browser Users

Shortly after the browser was launched, numerous fraudulent domains and fake applications were discovered. The post Hackers Target Perplexity Comet Browser Users appeared first on SecurityWeek.

North Korean Hackers Aim at European Drone Companies

Lazarus has used fake job offers in attacks targeting companies developing UAV technology, for information theft. The post North Korean Hackers Aim at European Drone Companies appeared first on SecurityWeek.

Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats

Paris, France, 24th October 2025, CyberNewsWire The post Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats appeared first on Security Boulevard.

Heisenberg: How We Learned to Stop Worrying and Love the SBOM

Turn SBOMs into supply chain defense with Heisenberg, an open source tool developed by Max Feldman and Yevhen Grinman. It stops risky pull requests (PRs) before they merge. The post Heisenberg: How We Learned to Stop Worrying and Love the SBOM ...

Cybersecurity Snapshot: Top Advice for Detecting and Preventing AI Attacks, and for Securing AI Systems

As organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to ...

In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia

Other noteworthy stories that might have slipped under the radar: Everest group takes credit for Collins Aerospace hack, Maryland launches VDP, gamers targeted with red teaming tool and RAT. The post In Other News: iOS 26 Deletes Spyware ...

How to Detect Shadow AI in Your Organization – FireTail Blog

Oct 24, 2025 - Alan Fagan - Quick Facts: Shadow AI DetectionShadow AI often hides in day-to-day tools; chatbots, plug-ins, or automation apps.It rarely looks like a threat; it starts as convenience.The signs: odd data access, unknown app traffic, ...

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)

Microsoft has released an out-of-band security update that “comprehensively” addresses CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is reportedly being exploited in the wild. ...

Toys ‘R’ Us Canada Customer Information Leaked Online

The customer information published on the dark web includes names, addresses, phone numbers, and email addresses. The post Toys ‘R’ Us Canada Customer Information Leaked Online appeared first on SecurityWeek.

Cross Site Scripting

Web applications are integral to modern business and online operations, but they can be vulnerable to security threats. Cross-Site Scripting (XSS) is a common vulnerability where attackers inject malicious scripts into trusted websites, ...

Insider Threat Prevention

Introduction: The Hidden Risk Inside Every Organization Cybersecurity often focuses on external threats—hackers, malware, phishing, and ransomware. But one of the most dangerous and underestimated risks often lies within the organization: the ...

Microsoft blocks risky file previews in Windows File Explorer

Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from the internet. The change affects the file management tool’s Preview Pane, which lets users see ...

Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks

In files downloaded from the internet, HTML tags referencing external paths could be used to leak NTLM hashes during file previews. The post Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks appeared first on SecurityWeek.