Application Security News and Articles


How a fake ICS network can reveal real cyberattacks

Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed ...

Creating a compliance strategy that works across borders

In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their ...

How DSPM Helps MSSPs Prove Value to Clients and Reduce Churn

Discover how DSPM helps MSSPs prove value, reduce churn, and strengthen client trust with proactive, data-centric security. The post How DSPM Helps MSSPs Prove Value to Clients and Reduce Churn appeared first on Security Boulevard.

Rayhunter: EFF releases open-source tool to detect cellular spying

The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic cell towers to trick phones into connecting so ...

Bots vs. humans? Why intent is the game-changer

In this Help Net Security video, Jérôme Segura, VP of Threat Research at Datadome, explains why intent, not just identifying bots, must be the new focus for cybersecurity teams. He explores how advanced AI agents and sophisticated bots blur the ...

Old file types, new tricks: Attackers turn everyday files into weapons

Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that workers and IT teams often trust. The latest quarterly Threat Insights Report from HP Wolf Security shows how ...

Self-Replicating Worm Compromising Hundreds of NPM Packages

An ongoing supply chain attack dubbed "Shai-Hulud" has compromised hundreds of packages in the npm repository with a self-replicating worm that steals secrets like API key, tokens, and cloud credentials and sends them to external servers that the ...

Ongoing npm Software Supply Chain Attack Exposes New Risks

Last updated 7:00 p.m. ET on September 16, 2025 The post Ongoing npm Software Supply Chain Attack Exposes New Risks appeared first on Security Boulevard.

FIRESIDE CHAT: The case for AI-Native SOCs built to take action, not just observe and alert

The raw attack surface isn’t just growing. It’s fragmenting. Logs from SaaS apps, cloud workloads, and third-party services flood security stacks already straining to keep up. Security teams are buried in alerts they can’t triage fast ...

News alert: OpenSSL 2025 kicks off in 3 weeks, global leaders to chart the future of cryptography

Newark, NJ, Sept. 16, 2025, CyberNewswire — The OpenSSL Conference 2025 will take place on October 7 – 9 in Prague. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global ...

CrowdStrike to Acquire Pangea to Launch AI Detection and Response (AIDR)

Acquisition extends CrowdStrike’s Falcon platform into AI security, introducing AI Detection and Response (AIDR) to protect enterprise models, agents, and applications across the full AI lifecycle. The post CrowdStrike to Acquire Pangea to ...

News alert: Seraphic integrates with CrowdStrike Marketplace, extends SIEM protection to browsers

Las Vegas, Sept. 16, 2025, CyberNewswire —Seraphic today announced at Fal.Con 2025 that its Secure Enterprise Browser (SEB) solution is now available for purchase in the CrowdStrike Marketplace, a one-stop destination for the world-class ...

Building Impenetrable Security with NHIs

Is Your Cybersecurity Truly Impenetrable? Achieving an “impenetrable security” remains an elusive goal for many organizations. Yet, the rise of Non-Human Identities (NHIs) presents an innovative approach to this challenge. With an efficient ...

Driving Innovation Through Secure NHI Practices

Why Should Secure NHI Practices Be a Priority? Is your organization prepared for increasing threats presented by unmanaged Non-Human Identities (NHIs)? Where the footprint of machine identities continues to increase, so does the risk associated ...

Reassure Your Stakeholders with Strong NHI Policies

Does Your Organization’s Security Strategy Include Strong NHI Policies? Ensuring robust cloud security is much more than just protecting data from cyber attacks. It includes managing Non-Human Identities (NHIs) and their associated secrets ...

Chinese-Made Villager AI Pentest Tool Raises Cobalt Strike-Like Concerns

Villager is being pitched as a legitimate AI-powered pentest tool for red teams, but the platform, made by Chinese company Cyberspike, has been loaded almost 11,000 times on PyPI in two months, raising concerns that it is on the same path as ...

Survey Surfaces Rising Number of AI Security Incidents

A global survey of 1,025 IT and security professionals finds that while organizations experienced an average of 2.17 cloud breaches over the past 18 months, only 8% were categorized as severe. At the same time, however, with the rise of ...

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

A potentially monumental supply chain attack is underway, thanks to a self-replicating worm-like payload that has been compromising packages published on the npm Registry. The worm has been dubbed “Shai-hulud” as it steals credentials ...

DEF CON 33: Illumicon

Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas Convention Center; and via the organizations ...

Check Point to Acquire AI Security Firm Lakera

Move highlights rising demand for AI-native security as enterprises face new risks from generative models and autonomous agents The post Check Point to Acquire AI Security Firm Lakera appeared first on SecurityWeek.