Application Security News and Articles


The Death of Legacy MFA and What Must Rise in Its Place

Tycoon 2FA proves that the old promises of “strong MFA” came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon ...

Hack of SitusAMC Puts Data of Financial Services Firms at Risk

SitusAMC, a services provider with clients like JP MorganChase and Citi, said its systems were hacked and the data of clients and their customers possibly compromised, sending banks and other firms scrambling. The data breach illustrates the ...

Randall Munroe’s XKCD ‘’Airspeed”

Permalink The post Randall Munroe’s XKCD ‘’Airspeed” appeared first on Security Boulevard.

Top 7 Strategies for Securing Customer Data While Expanding Your Business Internationally

Learn the top strategies to secure customer data when expanding internationally, from MFA and encryption to compliance, SIEM, and scalable security partners. The post Top 7 Strategies for Securing Customer Data While Expanding Your Business ...

Beyond the Dark Web: How OSINT Cyber Intelligence Uncovers Hidden Digital Risks

Cyber threats no longer hide exclusively in the dark web. Increasingly, the early signs of compromise—leaked credentials, impersonation accounts, phishing campaigns—emerge across the surface web, social platforms, and open-source data. To ...

From User Identity to Payroll Accuracy: Automating Local Tax Compliance with SaaS Tools

Learn how SaaS platforms can automate local payroll tax compliance using identity data, real-time tax APIs, geolocation, and secure workflows for accuracy. The post From User Identity to Payroll Accuracy: Automating Local Tax Compliance with SaaS ...

Shai-Hulud 2.0: over 14,000 secrets exposed

On November 24, a new wave of the Shai-Hulud supply chain attack emerged. The threat actors exfiltrate stolen credentials directly to GitHub repositories created with compromised tokens. GitGuardian identified 14,206 secrets across 487 ...

When the Browser Becomes the Battleground for AI and Last-Mile Attacks

For years we treated the browser as just another application. That era is over. As Vivek Ramachandran points out, the browser has quietly become the new endpoint—and attackers have noticed. Users now live in the browser for work, banking, ...

Stop Optimizing for Google. Start Optimizing for AI That Actually Answers Questions.

AI answer engines changed the game. It's no longer about ranking #1—it's about being cited in AI-generated responses. Learn how to build content infrastructure that ChatGPT, Perplexity, and Claude actually reference. Includes real ...

NDSS 2025 – Towards Understanding Unsafe Video Generation

SESSION Session 3D: AI Safety ----------- ----------- Authors, Creators & Presenters: Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz Center for Information Security), Tianhao Wang ...

CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability

CISA has added CVE-2025-61757 to its Known Exploited Vulnerabilities (KEV) catalog.  The post CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability appeared first on SecurityWeek.

CrowdStrike Insider Helped Hackers Falsely Claim System Breach

The company has confirmed that it terminated an insider who shared screenshots of his computer with cybercriminals. The post CrowdStrike Insider Helped Hackers Falsely Claim System Breach appeared first on SecurityWeek.

OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take Center Stage

Discover what’s changed in the OWASP 2025 Top 10 and how GitGuardian helps you mitigate risks like broken access control and software supply chain failures. The post OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take ...

Trend Vision One AI Security Package delivers proactive protection for AI environments

Trend Micro will launch the Trend Vision One AI Security Package in December. The package delivers centralized exposure management with analytics for AI-driven environments. It protects the AI application stack from model development to runtime ...

Shai-Hulud: The Second Coming

See how the latest Shai-Hulud attack works. The post Shai-Hulud: The Second Coming appeared first on Security Boulevard.

Microsoft Highlights Security Risks Introduced by New Agentic AI Feature

Without proper security controls, AI agents could perform malicious actions, such as data exfiltration and malware installation. The post Microsoft Highlights Security Risks Introduced by New Agentic AI Feature appeared first on SecurityWeek.

Black Friday 2025 cybersecurity deals to explore

Black Friday 2025 is shaping up to be a good moment for anyone thinking about tightening their cybersecurity. A few solid deals are popping up that make it easier to improve protection for systems and data without stretching your budget. If you ...

Security is at a Tipping Point: Why Complexity is the New Risk Vector 

Security is reaching a breaking point as growing technical complexity becomes a major risk vector. Learn why modern systems amplify threats—and how to stay ahead. The post Security is at a Tipping Point: Why Complexity is the New Risk Vector  ...

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention

Tel Aviv, Israel, 24th November 2025, CyberNewsWire The post Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention appeared first on Security Boulevard.

Mazda Says No Data Leakage or Operational Impact From Oracle Hack

The Cl0p ransomware group has listed Mazda and Mazda USA as victims of the Oracle EBS campaign on its leak website. The post Mazda Says No Data Leakage or Operational Impact From Oracle Hack appeared first on SecurityWeek.