Application Security News and Articles


Why CISOs are doubling down on cyber crisis simulations

Cyber threats aren’t going away, and CISOs know prevention isn’t enough. Being ready to respond is just as important. Cyber crisis simulations offer a way to test that readiness. They let teams walk through real-world scenarios in a ...

Transforming cybersecurity into a strategic business enabler

In this Help Net Security interview, Kevin Serafin, CISO at Ecolab, discusses aligning security strategy with long-term business goals, building strong partnerships across the organization, and approaching third-party risk with agility. How do ...

APTRS: Open-source automated penetration testing reporting system

APTRS is an open-source reporting tool built with Python and Django. It’s made for penetration testers and security teams who want to save time on reports. Instead of writing reports by hand, users can create PDF and Excel files directly in the ...

AI is challenging the geopolitical status quo

AI-powered cyberattacks are becoming powerful new weapons. Organizations need to act fast to close the gap between today’s defenses and tomorrow’s threats. These attacks are only going to grow. New data from Armis Labs shows that the threat ...

NSFOCUS WAF New UI Walkthrough: Site Configuration

Basic Information Functional Configuration Manage Advanced Features in One Page Security Settings Key Benefits The post NSFOCUS WAF New UI Walkthrough: Site Configuration appeared first on NSFOCUS, Inc., a global network and cyber security ...

Vite Arbitrary File Read Vulnerability (CVE-2025-31486)

Overview Recently, NSFOCUS CERT detected that Vite issued a security bulletin to fix the Vite arbitrary file read vulnerability (CVE-2025-31486); Because the Vite development server does not strictly verify the path when processing URL requests, ...

How Protected Are Your Cloud-Based Secrets?

Are Your Cloud-Based Secrets Truly Safe? Have you ever questioned the security of your cloud secrets? Whether it’s encrypted passwords, tokens, or keys, these secret identifiers hold immense value. Safeguarding them is absolutely crucial, and ...

Are Your NHIs Truly Secure in the Cloud?

Is Your Organization Recognizing the Importance of NHI Security? The intricacies of cybersecurity have only just begun to unveil their complexity. Have you ever paused to ponder the security of your non-human identities (NHIs) within your cloud? ...

The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and arguably worse than ever before. Relay attacks are ...

Microsoft fixes actively exploited Windows CLFS zero-day (CVE-2025-29824)

April 2025 Patch Tuesday is here, and Microsoft has delivered fixes for 120+ vulnerabilities, including a zero-day (CVE-2025-29824) that’s under active attack. CVE-2025-29824 CVE-2025-29824 is a user-after-free vulnerability in the Windows ...

BSidesLV24 – Breaking Ground – JIT Happens: How Instacart Uses AI to Keep Doors Open and Risks Closed

Authors/Presenters: Dominic Zanardi, Matthew Sullivan Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany ...

Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day

Patch Tuesday: Microsoft ships urgent cover for another WIndows CLFS vulnerability already exploited in the wild. The post Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day appeared first on SecurityWeek.

Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)

11Critical 110Important 0Moderate 0Low Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild. Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as ...

Adobe Calls Urgent Attention to Critical ColdFusion Flaws

The Adobe Patch Tuesday rollout covers 54 vulnerabilities, including code execution issues in the oft-targeted Adobe ColdFusion software. The post Adobe Calls Urgent Attention to Critical ColdFusion Flaws appeared first on SecurityWeek.

AI-Powered Phishing Kits: The New Frontier in Social Engineering

As artificial intelligence continues to transform how we do business, cybercriminals are finding equally innovative ways to weaponize it. Over the past few weeks, security researchers from Intel 471 and Proofpoint have uncovered a disturbing ...

21 Countries Sign Onto Voluntary Pact to Stem the Proliferation of Spyware

Twenty-one countries signed onto the Pall Mall Process, an effort a year in the making that was created to develop a framework nations could adopt to address the proliferation and malicious use of spyware by governments that want it to track ...

RansomSnub: RansomHub’s Affiliate Confusion

Executive Summary Since RansomHub’s emergence in early 2024, the group has become the most prolific Ransomware-as-a-Service group operating today. In […] The post RansomSnub: RansomHub’s Affiliate Confusion appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Orogeny’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Orogeny’ appeared first on Security Boulevard.

Building Resiliency in Critical Infrastructure Networks Using Microsegmentation: Lessons Learned in the Real World

“There is more than one way to skin a cat,” my grandmother used to tell me. It turns out this idea applies to operational technology (OT) security as well. If we take a look at the market (and my own experience in this industry), some common ...

Living-Off-the-Land (LOTL) Attacks: Exploiting What’s Already There

In cybersecurity, some of the most dangerous threats don’t come from exotic malware or zero-day exploits. Instead, they come from what’s already inside your environment—trusted tools, native utilities, and everyday system processes. Welcome ...