Application Security News and Articles


Ransomware Protection: Source Code Stolen, Patients Exposed, and Utilities Breached

In the first half of October 2025, we’ve seen zero-day exploits, source code theft, healthcare breaches, and attackers probing water utilities like they own the place. It’s a loud warning for defenders. Attackers are slipping past perimeters ...

Why 99% of Cold Emails to CISOs Fail (And the Surprising Truth About How They Actually Buy)

Cold emails to CISOs fail 99% of the time—not because security purchases are planned, but because they're reactive. New research shows 77% of cybersecurity deals are triggered by incidents and fear. Companies using targeted account-based ...

NDSS 2025 – Workshop on Security and Privacy in Standardized IoT (SDIoTSec) 2025, Keynote

Author, Creator & Presenter: Dr. May Wang PhD (Palo Alto Networks) Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference ...

China-linked Salt Typhoon hackers attempt to infiltrate European telco

Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak into yet another one. The intrusion “Darktrace observed activity in a European telecommunications ...

Building Chromegg: A Chrome Extension for Real-Time Secret Detection

Ever accidentally pasted an API key into a web form? Chromegg is our new Chrome extension that scans form fields in real-time, alerting you BEFORE you submit secrets. Open-source & ready to use! The post Building Chromegg: A Chrome Extension ...

Penetration testing vs red teaming: What’s the difference?

In cyber security, two terms are often used interchangeably but mean very different things: penetration testing and red teaming. Both involve authorised simulations of cyber attacks designed to uncover weaknesses, yet they differ in scope, ...

Jamf adds AI forensics to help organizations detect and respond to mobile threats

Jamf announced the beta release of AI Analysis for Jamf Executive Threat Protection, a new AI-powered capability designed to accelerate and simplify mobile forensic analysis. Jamf Executive Threat Protection is a mobile forensics solution that ...

SIM Farm Dismantled in Europe, Seven Arrested

The individuals ran a highly sophisticated cybercrime-as-a-service (CaaS) platform that caused roughly €5 million (~$5.8 million) in losses. The post SIM Farm Dismantled in Europe, Seven Arrested appeared first on SecurityWeek.

Lumma Stealer Activity Drops After Doxxing

The identities of alleged core members of the Lumma Stealer group were exposed in an underground doxxing campaign. The post Lumma Stealer Activity Drops After Doxxing appeared first on SecurityWeek.

ConnectWise Patches Critical Flaw in Automate RMM Tool

Attackers could exploit vulnerable deployments to intercept and tamper with communications in certain configurations. The post ConnectWise Patches Critical Flaw in Automate RMM Tool appeared first on SecurityWeek.

A “No-Brainer” Investment: Proactive Google Safety and Security with Cloud Monitor

Bureau Valley CUSD Protects Students and Data While Maximizing Budget and Efficiency Bureau Valley Community Unit School District (CUSD) in Manlius, Illinois, serves approximately 900 students and 180 faculty and staff. It operates on a 1:1 ...

Suspected Chinese Hackers Spent a Year-Plus Inside F5 Systems: Report

The suspected Chinese-backed threat actors that hacked into F5's systems and stole data from the security vendor's BIG-IP application suite spent more than a year inside the networks dtbefore being in detected in August, according to a Bloomberg ...

Agentic AI’s OODA Loop Problem

The OODA loop—for observe, orient, decide, act—is a framework to understand decision-making in adversarial situations. We apply the same framework to artificial intelligence agents, who have to make their decisions with untrustworthy ...

Beyond Bot Management: Why Reverse Proxy Phishing Demands a New Defense Strategy

The scale of credential theft through phishing has reached alarming proportions. Recent analysis of the LabHost phishing operation reveals that nearly 990,000 Canadians were directly victimized, with attackers primarily targeting private sector ...

Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks

On Android, the out-of-bounds write issue can be triggered during the processing of media files without user interaction. The post Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks appeared first on SecurityWeek.

NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million

The judge ruled that punitive damages of $167 million awarded by a jury were excessive. The post NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million appeared first on SecurityWeek.

MSG Accused of Misusing Facial Recognition, Mishandling Data 

A former Madison Square Garden executive alleges the company used facial recognition technology to target critics and violate privacy, leading to a wrongful termination and discrimination lawsuit. The case raises major concerns about ...

American Airlines Subsidiary Envoy Air Hit by Oracle Hack

Envoy Air, which operates the American Eagle brand, has confirmed that business information was stolen by hackers. The post American Airlines Subsidiary Envoy Air Hit by Oracle Hack appeared first on SecurityWeek.

How to migrate to passwordless from Azure B2C

A step-by-step, human-first guide on migrating from Azure AD B2C to passwordless authentication using modern OIDC providers like MojoAuth — with real-world lessons and pitfalls to avoid The post How to migrate to passwordless from Azure B2C ...

Most AI privacy research looks the wrong way

Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie Mellon University and Northeastern University. The authors argue that while most technical studies target data memorization, the ...