Application Security News and Articles


The 8 Most Dangerous File Types for Malware Infections

The post The 8 Most Dangerous File Types for Malware Infections appeared first on Votiro. The post The 8 Most Dangerous File Types for Malware Infections appeared first on Security Boulevard.

Risk-Based Vulnerability Management: Prioritize What Actually Matters

The post Risk-Based Vulnerability Management: Prioritize What Actually Matters appeared first on AI Security Automation. The post Risk-Based Vulnerability Management: Prioritize What Actually Matters appeared first on Security Boulevard.

The LLM Dependency Trap

Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems in a fraction of the time it used to take. The post The LLM ...

Aembit Connects AI and Workload Access to AWS Secrets Manager

4 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management. The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared ...

NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3

Author, Creator & Presenter: Keynote2: Frederik Braun (Mozilla) Session 3: Web3 and Work in Progress: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security ...

Beyond Alerts: Building Smarter, Context-Aware Threat Detection

Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises defend against modern cyber threats. Reed, who joined Vectra after years leading ...

Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)

7Critical 158Important 2Moderate 0Low Microsoft addresses 167 CVEs in its largest Patch Tuesday to date, including three zero-day vulnerabilities, two of which were exploited in the wild. Microsoft patched 167 CVEs in its October 2025 Patch ...

Preparing for the Next Wave of AI-Driven Threats

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal parts technical and creative—describing ...

China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence

The China-based APT group Flax Typhoon used a function within ArcGIS' legitimate geo-mapping software to create a webshell through which it established persistence for more than a year to execute malicious commands and steal credentials. The post ...

The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It

Despite continued investments in SIEMs, threat intelligence platforms, and managed detection services, many Security Operations Centers (SOCs) remain in a defensive position. SOCs are reactive, overstretched, and underprepared. High-profile ...

The Endpoint Has Moved to the Browser — Your Security Tools Haven’t

Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place ...

HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device

Investors are placing bets on a hardware-based approach to data security in a market dominated by software solutions for ransomware resilience. The post HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device appeared ...

What is OT Breach Ready Cyber Defense?

Learn how microsegmentation builds OT breach ready cyber defense, limits lateral movement, and protects industrial systems from disruptions. The post What is OT Breach Ready Cyber Defense? appeared first on ColorTokens. The post What is OT Breach ...

Sonatype Named a Visionary in the 2025 Gartner® Magic Quadrant™ for Application Security Testing

As a leader in AI-centric DevSecOps, Sonatype has been recognized as a Visionary in the 2025 Gartner Magic Quadrant for Application Security Testing (AST). The post Sonatype Named a Visionary in the 2025 Gartner® Magic Quadrant™ for ...

Beyond Passwords and API Keys: Building Identity Infrastructure for the Autonomous Enterprise

Static API keys scattered across repositories create exponential security debt as AI scales. The solution? Credentials that live for minutes, not months. X.509 certificates and service mesh technology provide the foundation for machine identity ...

#Pixnapping: Android Timing Attack Sends Google Back to the Drawing Board

If at first you don’t succeed: Researchers discover a new way to steal secrets from Android apps. The post #Pixnapping: Android Timing Attack Sends Google Back to the Drawing Board appeared first on Security Boulevard.

NDSS 2025 – IMPACT 2025, Session 3 And Keynote 2

Author, Creator & Presenter: Amir Houmansadr, Associate Professor of Computer Science, UMass Amherst Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb ...

LevelBlue acquires Cybereason to expand global MDR, XDR, and threat response leadership

LevelBlue has signed a definitive agreement to acquire Cybereason, a cybersecurity firm known for its Extended Detection and Response (XDR) platform, threat intelligence team, and digital forensics and incident response (DFIR) capabilities. For ...

Cybereason Acquired by MSSP Giant LevelBlue

This is LevelBlue’s third acquisition this year, after Trustwave and Aon’s Cybersecurity & IP Litigation Consulting groups. The post Cybereason Acquired by MSSP Giant LevelBlue appeared first on SecurityWeek.

6 Signs Your Point of Sale Systems are Under Attack

Point-of-sale (POS) data breaches continue to be one of the most damaging and costly cybersecurity incidents in the retail, restaurant, and hospitality industries. According to Verizon's 2025 Data Breach Investigations Report (DBIR), POS systems ...