Application Security News and Articles


Anchore Enterprise 5.22: OpenVEX, PURLs, and RHEL EUS Support

Anchore Enterprise 5.22 introduces three capabilities designed to make vulnerability management clearer, cleaner, and more trustworthy:  Each of these features adds context and precision to vulnerability data—helping teams reduce noise, speed ...

Building Confidence Through Traceability: Lessons From Mail and Tech

Learn how traceability builds customer trust through certified mail tracking and modern authentication. Boost reliability online and offline in 2025. The post Building Confidence Through Traceability: Lessons From Mail and Tech appeared first on ...

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned. The company blocked over 250 exploitation attempts targeting multiple stores on Wednesday, ...

Vibe Coding’s Real Problem Isn’t Bugs—It’s Judgment

As AI coding tools flood enterprises with functional but flawed software, researchers urge embedding security checks directly into the AI workflow. The post Vibe Coding’s Real Problem Isn’t Bugs—It’s Judgment appeared first on SecurityWeek.

Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk

Patched in September, the SessionReaper bug could be exploited without authentication to bypass a security feature. The post Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk appeared first on SecurityWeek.

BIND Updates Address High-Severity Cache Poisoning Flaws

The vulnerabilities allow attackers to predict source ports and query IDs BIND will use, and to inject forged records into the cache. The post BIND Updates Address High-Severity Cache Poisoning Flaws appeared first on SecurityWeek.

AI Application Vulnerability Remediation: Why AI Vulnerability Fixes Fail Without Runtime Context

TL;DR AI-powered vulnerability remediation often fails because it lacks context about how your applications actually work. Runtime intelligence solves this by providing AI with real-world application behavior data, architecture insights, and ...

Lanscope Endpoint Manager Zero-Day Exploited in the Wild

The bug has been exploited in the wild as a zero-day and the US cybersecurity agency CISA has added it to its KEV catalog. The post Lanscope Endpoint Manager Zero-Day Exploited in the Wild appeared first on SecurityWeek.

Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm

Verizon’s 2025 Mobile Security Index shows that 85% of organizations believe mobile device attacks are on the rise. The post Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm appeared first on SecurityWeek.

AuditBoard expands AI compliance with FairNow acquisition and Accelerate launch

AuditBoard has reached a definitive agreement to acquire FairNow. The addition of FairNow enhances AuditBoard’s capabilities with intelligent, automated, step-by-step AI compliance guidance. As AI governance requirements expand globally, ...

The Human Cost of Defense: A CISO’s View From the War Room

Semperis’ Midnight in the War Room reveals the unseen struggles, burnout and heroism of CISOs and defenders who protect our digital world every day. The post The Human Cost of Defense: A CISO’s View From the War Room appeared first on ...

Faster LLM tool routing comes with new security considerations

Large language models depend on outside tools to perform real-world tasks, but connecting them to those tools often slows them down or causes failures. A new study from the University of Hong Kong proposes a way to fix that. The research team ...

Affiliate Marketing Emails: Fix Deliverability to Stop Commission Loss

Struggling with affiliate email deliverability? Learn how to align SPF & DKIM to ensure your promos reach the inbox and protect your affiliate commissions. The post Affiliate Marketing Emails: Fix Deliverability to Stop Commission Loss ...

Smarter Threats Need Smarter Defenses: AI, APIs, and the Reality for Critical Infrastructure Security

Smarter Threats Need Smarter Defenses: AI, APIs, and the Reality for Critical Infrastructure Security madhav Thu, 10/23/2025 - 05:36 Critical infrastructure (CI) organizations are, as the name suggests, some of the most important in the global ...

Your wearable knows your heartbeat, but who else does?

Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports personalized treatment and long-term condition management. They give clinicians valuable ...

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several European defense contractors, including firms deeply involved in drone and ...

The next cyber crisis may start in someone else’s supply chain

Organizations are getting better at some aspects of risk management but remain underprepared for the threats reshaping the business landscape, according to a new Riskonnect report. The findings show a growing gap between awareness and action as ...

Gartner predicts the technologies set to transform 2026

Gartner has unveiled its vision for the technologies that will define 2026, spotlighting the innovations and risks that business and IT leaders can’t afford to ignore. The research firm says organizations are entering a period of change, where ...

What Happens When Your AI-Written App Gets Hacked

Imagine this: you just finished building a web app using an AI coding assistant. You let a subscription IDE like Copilot, Claude, Gemini…Continue reading on Medium »

Securing Mobile API with Approov & Cloudflare: A Powerful Integration

Cloudflare is a leading platform for securing APIs, websites, and web apps from malicious traffic and abuse. But while Cloudflare's WAF, Bot Management, and API Shield offer strong perimeter defenses, they don’t verify what is actually making ...