Application Security News and Articles


Why AI Red Teaming is different from traditional security

“72% of organizations use AI in business functions — but only 13% feel ready to secure it.” That gap, between adoption and preparedness, explains why traditional AppSec approaches aren’t enough.  Modern AI systems aren’t just software ...

HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale

The New HPE Networking: Integration Complete At Security Field Day, Hewlett Packard Enterprise showcased the results of its most ambitious integration effort: combining decades of networking expertise under a single, AI-driven security vision. ...

Navigating Fraud in Customer Verification and Real-Time Payments

As technology continues to rapidly advance (i.e. generative AI, large language models, quantum computing, etc.), financial institutions (FIs) must evolve while balancing opportunity and risk. FIs are embracing advanced technology to meet rising ...

Crypto Exchanges Hacked Again – for Over $100 Million

  Cybercriminals continue to target the cryptocurrency industry, this time with an exploit that affected the Balancer decentralized finance platform, with total losses exceeding $100 million and involving several exchanges that use the ...

Free ServiceNow Agentic AI Security Assessment | AppOmni

Assess your ServiceNow SaaS for Agentic AI and identity risks. Get a detailed report on vulnerabilities and compliance gaps. The post Free ServiceNow Agentic AI Security Assessment | AppOmni appeared first on AppOmni. The post Free ...

Fake spam filter alerts are hitting inboxes

A new phishing campaign is attempting to trick users into believing they’ve missed important emails, security researchers are warning. The emails The bogus email alerts look like they are coming from the recipient’s email domain, and ...

Sleepers Awake!

Here at ColorTokens, most CISOs we speak with understand the need to stop lateral movement attacks. They know that they will inevitably have an initial compromise at some point, for the simple reason that when it comes to perimeter security, the ...

NDSS 2025 – Power-Related Side-Channel Attacks Using The Android Sensor Framework

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar (Graz University of Technology), Andreas Kogler ...

ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure

A researcher found a way to exploit an SSRF vulnerability related to custom GPTs to obtain an Azure access token.  The post ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure appeared first on SecurityWeek.

1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium

An individual believed to have been involved in the operation of VenomRAT was arrested recently in Greece. The post 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium appeared first on SecurityWeek.

CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Federal agencies have reported as ‘patched’ ASA or FTD devices running software versions vulnerable to attacks. The post CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks appeared first on SecurityWeek.

Metrics Every CISO Needs for Threat-Led Defense Success

Security leaders are under increasing pressure to prove that their defenses actually work. Board members and stakeholders want to see measurable progress, yet most metrics available to CISOs today don’t quite fit that need.  The post Metrics ...

“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again)

CISA has ordered US federal agencies to fully address two actively exploited vulnerabilities (CVE-2025-20333, CVE-2025-20362) in Cisco Adaptive Security Appliances (ASA) and Firepower firewalls. “In CISA’s analysis of agency-reported ...

Webinar Today: The Future of Industrial Network Security

Join us as speakers from Cisco outline important steps industrial organizations can take to safeguard operations, achieve compliance, and enable sustainable growth. The post Webinar Today: The Future of Industrial Network Security appeared ...

How Rapid AI Adoption Is Creating an Exposure Gap

As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it. Key ...

TrojAI Defend for MCP brings real-time security, visibility, and policy enforcement to agentic AI

TrojAI has launched its new AI runtime defense solution for agentic AI workflows, TrojAI Defend for MCP. Model Context Protocol (MCP) is an open protocol that allows AI agents to connect with external data, tools, and services in a standardized ...

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm

The spam campaign is likely orchestrated by an Indonesian threat actor, based on code comments and the packages’ random names. The post Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm appeared first on SecurityWeek.

The Holiday Shopping Is a Stress Test for Password Security

Holiday shopping cybersecurity is a B2B issue. Learn how continuous password monitoring protects against credential threats. The post The Holiday Shopping Is a Stress Test for Password Security appeared first on Security Boulevard.

The 2025 GigaOm Anti-Phishing Radar: Key Takeaways for Navigating the Evolving Email Threat Landscape

As email remains the top vector for cyberattacks, the sophistication and scale of phishing tactics continue to evolve—often faster than traditional defenses can keep up. That’s why GigaOm’s 2025 Anti-Phishing Radar Report has become a ...

Supply Chain Security made the OWASP Top Ten, this changes nothing

If you’ve been in the security universe for the last few decades, you’ve heard of the OWASP Top Ten. It’s a list of 10 security problems that we move around every year and never really solve. Oh sure, there are a few things we’ve made ...