Application Security News and Articles


Valuable Information Leaked in LockBit Ransomware Hack 

Private messages, Bitcoin addresses, victim data, and attacker information were leaked after someone hacked a LockBit admin panel. The post Valuable Information Leaked in LockBit Ransomware Hack  appeared first on SecurityWeek.

Living Off the Land (LOTL) Attacks: How your tools are used against you?

Introduction A well-known organisation called SolarWinds was attacked in September 2019. In this attack, a hacker used a supply chain attack to inject malicious code into the system. More than 18,000 SolarWinds customers installed Updates ...

VicOne xAurient accelerates threat response for automakers

VicOne announced xAurient, a new automotive threat intelligence platform that enables streamlined threat response by delivering early threat intelligence tailored to the particular manufacturing environment of an original equipment manufacturer ...

Elastic Kibana Prototype Contamination Leads to Arbitrary Code Execution Vulnerability (CVE-2025-25014)

Overview Recently, NSFOCUS CERT detected that Elastic issued a security bulletin to fix the arbitrary code execution vulnerability caused by Elastic Kibana prototype contamination (CVE-2025-25014); Due to the prototype contamination problem in ...

Coro SAT module defends against phishing attacks

Coro unveiled its Security Awareness Training (SAT) module. A purpose-built solution, SAT helps SMBs reduce human error, defend against phishing attacks, and demonstrate compliance without adding new tools to manage. As part of Coro’s modular ...

BigID Privacy Executive Console delivers proactive risk intelligence

BigID announced Privacy Executive Console, a transformative capability within the BigID Next platform designed to empower privacy leaders with a centralized, up-to-date view of their privacy program’s performance, risk posture, and ...

May 2025 Patch Tuesday forecast: Panic, change, and hope

April was an event-filled month for cybersecurity. Patch Tuesday came to us quickly on April 8 – the earliest first Tuesday possible in a given month. We again saw large numbers of CVEs addressed with 84 in Windows 11 and 87 in Windows 10 and ...

Review: AI Agents in Action

If you’re trying to make sense of how to actually build AI agents, not just talk about them, AI Agents in Action might be for you. About the author Michael Lanham, Lead AI Developer at Brilliant Harvest, is a seasoned software and ...

Analyze resource-based policy dependencies across your AWS Organizations accounts

Managing multiple AWS accounts in an organization can get complicated, especially when trying to understand how services and permissions are connected. The Account Assessment for AWS Organizations open-source tool helps simplify this process by ...

Wi-Fi 7 trials show big performance gains for enterprise networks

The next generation of wireless technology is getting a real-world test, and the results are promising. Recent trials led by the Wireless Broadband Alliance (WBA), in partnership with AT&T, Intel, and CommScope, show that Wi-Fi 7 delivers a ...

New infosec products of the week: May 9, 2025

Here’s a look at the most interesting products from the past week, featuring releases from ProcessUnity, Searchlight Cyber, ServiceNow, and Verosint. ServiceNow unveils AI agents to accelerate enterprise self-defense The new AI agents, ...

Ensuring Certainty in NHIs’ Lifecycle Management

What Makes Effective NHIs and Secrets Lifecycle Management So Crucial? The importance of NHIs and Secrets Lifecycle Management in ensuring robust cybersecurity measures is becoming increasingly apparent. Why? It offers certainty and control over ...

Being Proactive with Your NHIDR Strategy

What Does A Proactive NHIDR Strategy Look Like? A proactive Non-Human Identity and Data Rights (NHIDR) strategy involves anticipating potential threats and challenges instead of waiting for them to occur. It covers facets like security, data ...

Unlock Capabilities with Advanced NHIs Management

Are You Fully Utilizing Advanced NHIs for Secure Management? Emerging from the cornerstones of technology and cybersecurity, Non-Human Identities Management (NHIs) is proving to be a game-changer. This advanced security framework centers around ...

How Managed Kubernetes-as-a-Service Unlocks Immediate Value

In this digital-first world, organizations are constantly under pressure to deliver software and services faster, more reliably, and at greater scale. Platform teams, often small but tasked with supporting dozens or even hundreds of engineers, ...

An open letter to FireTail customers about security and data privacy – FireTail Blog

May 08, 2025 - Lina Romero - In the current landscape, we are seeing an upward trend of attacks, and this is only continuing to rise. The way we’ve been approaching applications needs to change drastically to address the growing risk vectors. ...

LLM02: Sensitive Information Disclosure – FireTail Blog

May 08, 2025 - Lina Romero - In 2025, AI security is a relevant issue. With the landscape changing so rapidly and new risks emerging every day, it is difficult for developers and security teams to stay on top of AI security. The OWASP Top 10 ...

How SCIM Works: The REST API Powering Modern Identity Provisioning

This article is part of SSOJet's technical series on identity protocols and standards. For more information on implementing SCIM with SSOJet's turnkey SSO integration solution, visit our documentation or contact our support team. The post How ...

How to Unite Developers, DevOps, and Security Without Slowing Down

5 min readBuilders and protectors don’t have to clash – they just need a common path. The post How to Unite Developers, DevOps, and Security Without Slowing Down appeared first on Aembit. The post How to Unite Developers, DevOps, and Security ...

BSidesLV24 – Hacking Trust Establishment

Author/Presenter: Carrie Randolph Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...