Application Security News and Articles


Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show that anyone within ...

The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related ...

ImmuniWeb Expands discovery with ASM and Dark web packages

On top of several new free tools launched during the summer, ImmuniWeb released over 500 updates, improvements, new features, and integrations across all our products in Q3, including ImmuniWeb On-Demand, ImmuniWeb MobileSuite, ImmuniWeb ...

Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management 

Global sales SVP at Qualys Shawn O’Brien kicked off the company’s Qualys ROCon 2025 event this week in Houston, Texas. Driving straight into an opening keynote to explain what ROCon means today (remember that Qualys traditionally used the ...

Powerful Tools for Managing Machine Identities

What Are Non-Human Identities in Cybersecurity? Machine identities, often referred to as Non-Human Identities (NHIs), have become paramount. But what exactly are NHIs, and why are they crucial? These identities are essentially the digital ...

A View from the C-suite: Aligning AI security to the NIST RMF – FireTail Blog

Oct 15, 2025 - Jeremy Snyder - In 2025, the AI race is surging ahead and the pressure to innovate is intense. For years, the NIST Cybersecurity Framework (CSF) has been our trusted guide for managing risk. It consists of five principles: ...

Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales

Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action  October is Cybersecurity Awareness Month — but awareness alone doesn’t protect your store. ...

Seceon for Finance: Safeguarding the Digital Economy

In today’s hyper-connected economy, financial institutions operate across cloud systems, digital payment networks, and third-party integrations — forming the nerve center of global commerce. But with this connectivity comes unprecedented ...

NDSS 2025 – MADWeb 2025, Session 1: Network Meets The Web

Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing ...

Frequently Asked Questions About The August 2025 F5 Security Incident

Frequently asked questions about the August 2025 security incident at F5 and the release of multiple BIG-IP product patches. Background Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions ...

Code Scanning in 2025: Why, How & the Role of Scanning in AI Security

Explore code scanning benefits, tools, and best practices. The post Code Scanning in 2025: Why, How & the Role of Scanning in AI Security appeared first on Security Boulevard.

News Alert: MCPTotal unveils the first platform to secure Model Context Protocol workflows

NEW YORK, Oct. 15, 2025, CyberNewswire — MCPTotal, a comprehensive secure Model Context Protocol (MCP) platform, today announced its flagship platform to help businesses adopt and secure MCP servers. MCP has become the standard interface fxor ...

Randall Munroe’s XKCD ‘’Hiking”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Hiking” appeared first on Security Boulevard.

SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta

Premier industrial cybersecurity conference Offers 70+ sessions, five training courses, and and ICS Village CTF competition. The post SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta appeared first on SecurityWeek.

HYPR Delivers the First True Enterprise Passkey for Microsoft Entra ID

For years, the promise of a truly passwordless enterprise has felt just out of reach. We’ve had passwordless for web apps, but the desktop remained a stubborn holdout. We’ve seen the consumer world embrace passkeys, but the solutions were ...

F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info

US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today. BIG-IP vulnerabilities are often ...

NDSS 2025 – MADWeb 2025, Opening Remarks and Keynote 1

Author, Creator & Presenter: Keynote 1 - Nick Nikiforakis, Stony Book University Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our ...

F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data

F5 has not shared too much information on the threat actor, but the attack profile seems to point to China. The post F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data appeared first on SecurityWeek.

Webinar Today: Fact vs. Fiction – The Truth About API Security

Get practical guidance to protect APIs against the threats attackers are using right now. The post Webinar Today: Fact vs. Fiction – The Truth About API Security appeared first on SecurityWeek.

Patch Tuesday Update – October 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 196 CVEs, including 21 republished CVEs. Overall, Microsoft announced 3 Zero-Day, 17 Critical, and 164 Important vulnerabilities. From an Impact perspective, ...