Application Security News and Articles


Possible Zero-Day Patched in SonicWall SMA Appliances

SonicWall patches three SMA 100 vulnerabilities, including a potential zero-day, that could be chained to execute arbitrary code remotely. The post Possible Zero-Day Patched in SonicWall SMA Appliances appeared first on SecurityWeek.

Yet another SonicWall SMA100 vulnerability exploited in the wild (CVE-2025-32819)

SonicWall has fixed multiple vulnerabilities affecting its SMA100 Series devices, one of which (CVE-2025-32819) appears to be a patch bypass for an arbitrary file delete vulnerability that was exploited in zero-day attacks in early 2021, and may ...

Outpost24 expands EASM platform with modules for social media and data leakage

Outpost24 integration of two new Digital Risk Protection (DRP) modules to its External Attack Surface Management (EASM) platform. The Social Media and Data Leakage modules are now offered alongside the Leaked Credentials and Dark Web modules to ...

Taming the Machine: Putting Security at the Core of Generative AI

AI advancements, particularly Large Language Models (LLMs) and other generative model types, unlock opportunities to develop applications faster through task automation and information processing. Speed to innovation is so prized that the ...

The Subscription Society

In the quaint town of Everyville, USA, Sarah starts her day with a familiar routine. She wakes up in her rented apartment, checks her phone (leased through her mobile plan), and streams her favourite morning playlist on Spotify. As she sips her ...

Google Finds Data Theft Malware Used by Russian APT in Select Cases

Russia-linked APT Star Blizzard is using the ClickFix technique in recent attacks distributing the LostKeys malware. The post Google Finds Data Theft Malware Used by Russian APT in Select Cases appeared first on SecurityWeek.

Rethinking Executive Security in the Age of Human Risk

Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue - it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation... The post ...

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

The patches for an exploited Samsung MagicINFO vulnerability are ineffective and a Mirai botnet has started targeting it. The post Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet appeared first on SecurityWeek.

How Much Does PCI DSS Compliance Cost in 2025?

Why Are PCI Costs Rising in 2025? Recent trends indicate that achieving and maintaining PCI DSS compliance has grown notably more expensive. Several factors contribute to this rise: 1. Inflation and General Rising Costs Like many sectors, the ...

PSA: What Microsoft’s New DMARC Policy Means for High-Volume Senders

Microsoft has recently announced a key update to its DMARC (Domain-based Message Authentication, Reporting & Conformance) policy for high-volume senders. This policy, which is already being enforced as of May 5, 2025—three days ago at the ...

Abuse takes its “toll” on .top: But who is paying the price?

Despite ICANN issuing a formal notice to .top citing a breach of contract for failing to address DNS abuse, the situation has not improved. Over the last six months, abuse of .top hasn’t just persisted, it’s gotten 50% worse! So, why is this ...

Cisco Patches 35 Vulnerabilities Across Several Products

Cisco releases patches for 26 vulnerabilities in IOS and IOS XE software, including 17 critical- and high-severity bugs. The post Cisco Patches 35 Vulnerabilities Across Several Products appeared first on SecurityWeek.

Dozens of SysAid Instances Vulnerable to Remote Hacking

SysAid patches IT service management software vulnerabilities that can be chained for unauthenticated remote command execution.  The post Dozens of SysAid Instances Vulnerable to Remote Hacking appeared first on SecurityWeek.

How Escape Enabled Deeper Business Logic Testing for Arkose Labs

Arkose Labs is a global cybersecurity company that specializes in account security, including bot management, device ID, anti-phishing and email intelligence. Its unified platform helps the world’s biggest enterprises across industries, ...

Protect Yourself From Cyber’s Costliest Threat: Social Engineering

Today, it is safe to say that social engineering has become the most dangerous and costly form of cybercrime that businesses face.   The post Protect Yourself From Cyber’s Costliest Threat: Social Engineering appeared first on Security Boulevard.

Cisco’s new chip wants to scale quantum computing faster

Cisco is making significant strides in quantum computing by focusing on quantum networking, aiming to bring practical applications closer to reality. The company recently introduced a prototype of its Quantum Network Entanglement Chip and ...

The Most Pressing Security Threat to Business is Hidden in Plain Sight

Ultimately, investing in security isn't just about the digital world. For organizations to be successful, they need to take a fundamentally holistic approach to protecting what matters most - people, company data and IP.  The post The Most ...

From certificate chaos to scalable simplicity: Why partners are rethinking how they sell and manage SSL

Managing SSL certificates used to be tedious and manual, but not anymore. With Sectigo’s Certificate as a Service (CaaS), partners can shift from per-cert chaos to scalable, subscription-based simplicity. Automate renewals, support OV certs, ...

ServiceNow unveils AI agents to accelerate enterprise self-defense

ServiceNow launched a new, agentic chapter in enterprise security and risk, introducing AI agents to power the rise of self-defending enterprises. The new agents, available within ServiceNow’s Security and Risk solutions, are designed to ...

Masimo Manufacturing Facilities Hit by Cyberattack

Health technology and consumer electronics firm Masimo detected unauthorized activity on its network in late April. The post Masimo Manufacturing Facilities Hit by Cyberattack appeared first on SecurityWeek.