Application Security News and Articles


Marks & Spencer Says Data Stolen in Ransomware Attack

Marks & Spencer has confirmed that personal information was stolen in a recent cyberattack claimed by a ransomware group. The post Marks & Spencer Says Data Stolen in Ransomware Attack appeared first on SecurityWeek.

China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures

Executive Summary   EclecticIQ analysts assess with high confidence that, in April 2025, China-nexus nation-state APTs (advanced persistent threat) launched high-temp exploitation campaigns against critical infrastructure networks by targeting ...

Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying 

A Turkey-affiliated espionage group has exploited a zero-day vulnerability in Output Messenger since April 2024. The post Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  appeared first on SecurityWeek.

INE Security Alert: Top 5 Takeaways from RSAC 2025

Cary, North Carolina, 13th May 2025, CyberNewsWire The post INE Security Alert: Top 5 Takeaways from RSAC 2025 appeared first on Security Boulevard.

Suspected DoppelPaymer Ransomware Group Member Arrested

A 45-year-old individual was arrested in Moldova for his suspected involvement in DoppelPaymer ransomware attacks. The post Suspected DoppelPaymer Ransomware Group Member Arrested appeared first on SecurityWeek.

Orca Snaps Up Opus in Cloud Security Automation Push

Orca positioned the deal as an expansion of its capabilities into the realm of AI-based autonomous remediation and prevention.  The post Orca Snaps Up Opus in Cloud Security Automation Push appeared first on SecurityWeek.

Detecting Hidemium: Fingerprinting inconsistencies in anti-detect browsers

This is the fourth article in our series on anti-detect browsers. In the previous post, we explained how to detect anti-fingerprinting scripts injected via Chrome DevTools Protocol (CDP). Here, we analyze Hidemium, a popular anti-detect browser, ...

India-Pakistan Conflicts Escalating: Military Operations and DDoS Attacks Making Targeted Strikes

Background On May 7, 2025, NSFOCUS Fuying Lab released “Two-Front Confrontation: Parallel Narratives of India-Pakistan Reality Friction and Cyber DDoS Attacks“, which analyzed the DDoS attack activities in the early stage of India-Pakistan ...

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

An information exposure flaw in TeleMessage has been added to CISA’s Known Exploited Vulnerabilities catalog.  The post CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  appeared first on SecurityWeek.

Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated

The cybersecurity landscape has never moved faster — and the people tasked with defending it have never felt more exposed. Related: How real people are really using GenAI Today’s Chief Information Security Officers (CISOs) operate in a ...

GenAI’s New Attack Surface: Why MCP Agents Demand a Rethink in Cybersecurity Strategy

Anthropic’s Model Context Protocol (MCP) is a breakthrough standard that allows LLM models to interact with external tools and data systems with unprecedented flexibility. The post GenAI’s New Attack Surface: Why MCP Agents Demand a Rethink ...

CISOs must speak business to earn executive trust

In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support ...

Artificial Intelligence in Cybersecurity – The Solutions You Need

Artificial Intelligence is something that we as organizations need to keep up with our technology-loving contemporaries. After all, it’s the goal of every organization to be its best version and become the king of the room. To do so, we need no ...

CISO Survey Surfaces Shift in Application Security Responsibilities

A global survey of 200 CISOs suggests responsibility for application security is shifting more toward the teams building and deploying software. The post CISO Survey Surfaces Shift in Application Security Responsibilities appeared first on ...

AI vs AI: How cybersecurity pros can use criminals’ tools against them

For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which optimize results without a need for developer intervention. As agentic ...

Futurum Group Research Sees Cybersecurity Spending Reaching $287.6B by 2029

An analysis of revenue growth forecasts by The Futurum Group sees cybersecurity spending reaching $287.6 billion by 2029. The post Futurum Group Research Sees Cybersecurity Spending Reaching $287.6B by 2029 appeared first on Security Boulevard.

Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As ...

Review: Resilient Cybersecurity

Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology ...

UNIDIR Intrusion Path: New framework to analyze ICT environment activities

Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are too complex or because media coverage oversimplifies the issues. To help ...