Application Security News and Articles


Cybersecurity jobs available right now: June 10, 2025

The post Cybersecurity jobs available right now: June 10, 2025 appeared first on Help Net Security.

Identity’s New Frontier: AI, Machines, and the Future of Digital Trust

The identity industry faces its biggest shift yet: machines now outnumber humans 90:1 in digital systems. From AI-powered authentication to passwordless futures, discover the $61.74B transformation reshaping how we think about digital trust and ...

News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security

Tel Aviv, Israel, June 9, 2025, CyberNewswire — Seraphic Security, a leader in enterprise browser security, today announced the launch of BrowserTotal, a unique and proprietary public service enabling enterprises to assess their browser ...

Why agentic identities matter and what you need to know

We are entering the age of agentic AI — systems that don’t just assist but act. These agents can make decisions, carry out tasks, and adapt to changing contexts — autonomously. But with autonomy comes accountability. And the question ...

9 AI Infrastructure Terms: Must-Know Definitions

With the rise of AI across every industry, the buzzwords are flying fast—AI infrastructure, infrastructure for AI workloads, autonomous infrastructure, and more. The problem? These terms are often used interchangeably, and it’s easy to get ...

BadBox 2.0 Botnet Infects Million-Plus Devices, FBI Says

BadBox 2.0, which emerged two years after the initial iteration launched and a year after it was disrupted by vendors, has infected more than 1 million IoT consumer devices, prompting a warning to such systems from the FBI. The post BadBox 2.0 ...

Device ID: Your Secret Weapon Against Unauthorized Account Sharing

Unauthorized account sharing is a pervasive threat to digital platforms. This widespread issue—often perceived as harmless by consumers—is eating into your revenue, skewing your user metrics, and diminishing the experience for your legitimate ...

What is AI Red Teaming?

Stay updated on the latest in application security with the OWASP Top 10 vulnerabilities. The post What is AI Red Teaming? appeared first on Security Boulevard.

OffensiveCon25 – Parser Differentials: When Interpretation Becomes a Vulnerability

Author/Presenter: Joernchen Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton ...

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’

Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. The post Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ appeared ...

Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign

Anti-malware vendor said it spent the past twelve months deflecting a stream of network reconnaissance probes from China-nexus threat actors The post Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign appeared first ...

Update: Dumping Entra Connect Sync Credentials

Recently, Microsoft changed the way the Entra Connect Connect Sync agent authenticates to Entra ID. These changes affect attacker tradecraft, as we can no longer export the sync account credentials; however, attackers can still take advantage of ...

Randall Munroe’s XKCD ‘Bridge Types’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bridge Types’ appeared first on Security Boulevard.

Security in the Age of AI with Anand Oswal

At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and ...

Security in the Age of AI with Anand Oswal at RSAC Conference 2025

At this year’s RSAC Conference, one theme loomed large: AI isn’t just a tool anymore—it’s a battleground. Industry veteran Anand Oswal discussed how AI is reshaping both sides of the cybersecurity equation: It’s amplifying the speed and ...

OffensiveCon25 – Entrysign: Create Your Own x86 Microcode for Fun and Profit

Authors/Presenters: Matteo Rizzo, Kristoffer `spq` Janke, Eduardo Vela Nava and Josh Eads Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. ...

Guardz Banks $56M Series B for All-in-One SMB Security

The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial. The post Guardz Banks $56M Series B for All-in-One SMB Security appeared first on SecurityWeek.

EU launches EU-based, privacy-focused DNS resolution service

DNS4EU, an EU-based DNS resolution service created to strengthen European Union’s digital sovereignty, has become reality. What is DNS? The Domain Name System (DNS) “translates” human-readable domain names into IP addresses and ...

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability 

CVE-2025-24016, a critical remote code execution vulnerability affecting Wazuh servers, has been exploited by Mirai botnets. The post Mirai Botnets Exploiting Wazuh Security Platform Vulnerability  appeared first on SecurityWeek.

Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI

In a new cybersecurity EO, President Trump is taking a hatchet to some mandates imposed by Presidents Biden and Obama around digital identities and election interference and narrowing requirements for AI, quantum computing, and software ...