Application Security News and Articles


NDSS 2025 – Workshop on Binary Analysis Research (BAR) 2025, Session II: Applying Binary Analysis

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel. Permalink The post ...

Qantas, DraftKings, and Other Recent Breaches

Mid-October Check-In Here we are in mid-October, and 2025 shows no signs of slowing down on the cyber front. In just the past week, organizations across industries have suffered significant breaches, keeping threat researchers busy analyzing the ...

From Generic Code to Specialist AI: How MCP Will Reshape the Developer Experience

One of the challenges with using AI and LLMs to generate code today is that they mostly produce generic code. That shouldn't surprise us. The post From Generic Code to Specialist AI: How MCP Will Reshape the Developer Experience appeared first on ...

Emulating the Prominent Global Group Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Global Group ransomware, a threat that first appeared in June 2025 and quickly became notorious across the security landscape. The group has primarily targeted ...

F5 BIG-IP Breach: 44 CVEs That Need Your Attention Now

Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble. You don’t build a fire extinguisher while the house is burning. You find every spark before it becomes the next ...

News Alert: Infineon debuts DEEPCRAFT™ AI Suite to power voice AI at the edge

Munich, Germany – Oct. 16, 2025 – Edge AI is reshaping the way we live, work, and interact in an increasingly connected world. To drive this transformation, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is expanding its Edge AI … ...

“Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)

CISA has added CVE-2025-54253, a misconfiguration vulnerability in Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), to its Known Exploited Vulnerabilities catalog, thus warning of detected in-the-wild exploitation. Adobe ...

Bad sushi: China-nexus phishers shift to residential proxies

Earlier this year, Spamhaus researchers observed a major shift in phishing targeting Japan. Starting in April, a China-nexus threat actor began using residential proxy networks to send phishing emails instead of subnets at China Telecom and China ...

The AI Agent Identity Crisis: Why Your IAM Strategy Needs a Machine-First Redesign

While you perfected human identity management, machines quietly took over your infrastructure. AI agents now handle 70% of identity transactions, but most IAM strategies still treat them as afterthoughts. This creates dangerous security gaps that ...

NDSS 2025 – Workshop on Binary Analysis Research (BAR) 2025, Keynote II

Authors, Creators & Presenters: Dr. Heng Yin PhD, Professor, Department of Computer Science and Engineering, University of California, Riverside Workshop on Binary Analysis Research (BAR) 2025, co-located with the Network and Distributed ...

Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign

The tech giant attributed the attacks to Vanilla Tempest, also known as Vice Spider and Vice Society. The post Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign appeared first on SecurityWeek.

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

CornCon 11 emphasized security basics, real-world risk alignment, and sustainable practices to help teams build resilient programs in today’s complex threat landscape. The post Rethinking Security Resilience And Getting Back To Basics At ...

Top 10 Emerging Technology Trends to Watch in 2026 and Beyond

Picture this: it’s 2026. You’re in a meeting or sketching your next big product, and somewhere, silently, AI agents are negotiating workflows, your codebase is...Read More The post Top 10 Emerging Technology Trends to Watch in 2026 and Beyond ...

Inside the F5 Breach

On October 15, 2025, F5 publicly confirmed that its internal systems had been compromised by what it described as a highly sophisticated, nation-state threat actor. The attacker gained access to development environments, exfiltrated source code ...

Get Your Developers Back to Work

Unused and dead code and Java vulnerabilities are making hard to get developers back to work. But there are ways. The post Get Your Developers Back to Work appeared first on Azul | Better Java Performance, Superior Java Support. The post Get ...

AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly

AISLE aims to automate the vulnerability remediation process by detecting, exploiting, and patching software vulnerabilities in real time. The post AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the ...

Matters.AI Raises $6.25 Million to Safeguard Enterprise Data

The company’s AI Security Engineer autonomously keeps enterprise data protected across devices and environments. The post Matters.AI Raises $6.25 Million to Safeguard Enterprise Data appeared first on SecurityWeek.

Organizations Warned of Exploited Adobe AEM Forms Vulnerability

A public PoC existed when Adobe patched the Experience Manager Forms (AEM Forms) bug in early August. The post Organizations Warned of Exploited Adobe AEM Forms Vulnerability appeared first on SecurityWeek.

AI and Cyber Control Assessment for Risk Visibility | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post AI and Cyber Control Assessment for Risk Visibility | Kovrr appeared first on Security Boulevard.

A Zero-day Incident Response Story from the Watchers on the Wall

When I woke up the morning of September 8, I didn’t have the foggiest idea what the day had prepared for me. The most terrifying part of being a security person is the first few minutes of your day when you check the dashboards. By mid-morning ...