Application Security News and Articles


When AI agents go rogue, the fallout hits the enterprise

In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated into real-world systems. Issues like hallucinations, prompt injections, and embedded biases can turn these systems ...

Microsoft vulnerabilities: What’s improved, what’s at risk

Microsoft reported a record 1,360 vulnerabilities in 2024, according to the latest BeyondTrust Microsoft Vulnerabilities Report. The volume marks an 11% increase from the previous record in 2022 and fits within a broader post-pandemic trend: more ...

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies The post Exploiting SMS: Threat Actors Use Social Engineering to Target Companies appeared first on Security Boulevard.

Inside PlugValley: How this AI vishing-as-a-service group operates

In this Help Net Security video, Alexis Ober, Threat Intel Analyst at Fortra, discusses the threat actor group PlugValley, which is now offering AI-powered vishing-as-a-service. Rather than requiring technical skills or large budgets, ...

Review: Hands-On Industrial Internet of Things

Hands-On Industrial Internet of Things is a practical guide designed specifically for professionals building and securing industrial IoT (IIoT) systems. About the authors Giacomo Veneri brings deep expertise in telecommunications and AI, shaped ...

From maintenance to innovation: The cultural impact of managed secrets

How modern secrets management shapes culture, reduces friction, and clears the way for developer innovation The post From maintenance to innovation: The cultural impact of managed secrets appeared first on Security Boulevard.

MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection

Mend.io continues to deliver uninterrupted, multi-source vulnerability protection. The post MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection appeared first on Security Boulevard.

From PyPI to the Dark Marketplace: How a Malicious Package Fuels the Sale of Telegram Identities

Introduction In today’s digital era, security breaches can occur in the blink of an eye. Telegram Desktop is renowned for its secure, user-friendly messaging interface, but what if the data used to provide seamless experience could also be your ...

Krebs Exits SentinelOne After Security Clearance Pulled

Chris Krebs has resigned from SentinelOne after security clearance withdrawn and an order to review CISA’s conduct under his leadership. The post Krebs Exits SentinelOne After Security Clearance Pulled appeared first on SecurityWeek.

Whistleblower: Musk’s DOGE Stole Data, Caused Breach at U.S. Agency

A whistleblower in the NLRB said in sworn testimony that staffers within the Musk-led DOGE group breached agency systems, exfiltrated sensitive data, and used tools and techniques similar to those wielded by cybercriminals to hide their ...

AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale

Slash SOC response times from hours to minutes with Morpheus AI—register for our live AI workshop on May 7 to transform your Tier 1/2 operations. The post AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale appeared first on D3 ...

Vector and Embedding Weaknesses in AI Systems

Learn how to secure embeddings against poisoning, leakage, and inversion attacks. The post Vector and Embedding Weaknesses in AI Systems appeared first on Security Boulevard.

Apple Quashes Two Zero-Days With iOS, MacOS Patches

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms. The post Apple Quashes Two Zero-Days With iOS, MacOS Patches appeared first on SecurityWeek.

Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal

Concerns about the future of the MITRE CVE Program continue to circulate. The Tenable Security Response Team has created this FAQ to help provide clarity and context around this developing situation. Background The Tenable Security Response Team ...

BSidesLV24 – Common Ground – 101 Things Your Application is Doing Without Your Knowledge

Author/Presenter: Mike Larkin Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

What’s New at ManagedMethods: New Features, Smarter Tools & Smoother Experiences

Our engineering team has been busy behind the scenes building and improving our cybersecurity and safety products. We’ve been gathering feedback from our amazing customers (that’s you!) and turning it into new features and upgrades across the ...

Randall Munroe’s XKCD ‘Anachronym Challenge’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Anachronym Challenge’ appeared first on Security Boulevard.

What’s happening with MITRE and the CVE program uncertainty

Yesterday's headlines have sent ripples through the cybersecurity and software supply chain communities: MITRE announced that U.S. government funding for the CVE (Common Vulnerabilities and Exposures) database was set to expire today. Overnight, ...

MITRE CVE Program Gets Last-Hour Funding Reprieve

The US government's cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational. The post MITRE CVE Program Gets Last-Hour Funding Reprieve appeared first on SecurityWeek.

Why the 2025 PyPI Attack Signals a New Era in Cloud Risk

The 2025 PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and evolving threats. The post Why the 2025 PyPI Attack Signals a New Era in Cloud Risk appeared first on Security ...