Application Security News and Articles


Connectwise is rotating code signing certificates. What happened?

Connectwise customers who use the company’s ScreenConnect, Automate, and ConnectWise RMM solutions are urged to update all agents and/or validate that the update has been deployed by Friday, June 13 at 8:00 p.m. ET, or risk disruptions. The ...

Cyber GRC Starts With Smarter Cyber Risk Registers | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cyber GRC Starts With Smarter Cyber Risk Registers | Kovrr appeared first on Security Boulevard.

Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices

Vulnerable DTResearch UEFI firmware applications can be used in BYOVD attacks to bypass Secure Boot. The post Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices appeared first on SecurityWeek.

5 Reasons to Replace VPNs with a Remote Privileged Access Management Solution (RPAM)

Security isn’t about holding on to what’s familiar; it’s about evolving. And when it comes to remote access, ZSP RPAM is the future.  The post 5 Reasons to Replace VPNs with a Remote Privileged Access Management Solution (RPAM) appeared ...

Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape

Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business. The post Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape appeared first on SecurityWeek.

Why DAST Is Critical for Cyber Resilience Act Compliance

The EU’s Cyber Resilience Act is reshaping how companies build and secure digital products. Learn why modern DAST is critical for CRA compliance from secure development to incident response and how to prepare before the 2027 deadline. The post ...

SpecterOps Privilege Zones enables security teams to define logical access boundaries

SpecterOps introduced Privilege Zones, a new addition to its flagship BloodHound Enterprise platform. Privilege Zones enable teams to define custom security boundaries around business-critical resources and enforce least privilege access ...

Trustwise protects AI deployments from security risks

Trustwise introduced Harmony AI, a runtime trust layer and control tower designed for enterprises deploying fleets of generative and agentic AI systems. Harmony AI embeds “trust as code” directly into AI systems, empowering CISOs, developers, ...

Meeting CJIS v6.0 Password Security Requirements

How CJIS v6.0 enhances password security and how Enzoic helps law enforcement meet new requirements for banning and monitoring credentials. The post Meeting CJIS v6.0 Password Security Requirements appeared first on Security Boulevard.

Fortinet, Ivanti Patch High-Severity Vulnerabilities

Patches released by Fortinet and Ivanti resolve over a dozen vulnerabilities, including high-severity flaws leading to code execution, credential leaks. The post Fortinet, Ivanti Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

40,000 Security Cameras Exposed to Remote Hacking

Bitsight has identified over 40,000 security cameras that can be easily hacked for spying or other types of malicious activity. The post 40,000 Security Cameras Exposed to Remote Hacking appeared first on SecurityWeek.

DoD issues new marching orders on secure software and SBOMs

The push for software that is secure by design as well as for improved software supply chain security is gaining momentum with new marching orders from the U.S. Department of Defense (DoD) as it revamps how it tests, authorizes, and procures ...

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years

Investigators leveraged a vulnerability dubbed DanaBleed to obtain insights into the internal operations of the DanaBot botnet. The post Recently Disrupted DanaBot Leaked Valuable Data for 3 Years appeared first on SecurityWeek.

Cyera Raises $540 Million to Expand AI-Powered Data Security Platform

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion. The post Cyera Raises $540 Million to Expand AI-Powered Data Security Platform appeared first on SecurityWeek.

Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)

For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Also, Adobe Commerce and Magento Open Source users are urged to update quickly. About CVE-2025-33053 CVE-2025-33053 is a ...

Horizon3.ai Raises $100 Million in Series D Funding

Horizon3.ai has raised $100 million to expand product capabilities, and to scale its partner ecosystem and federal market presence. The post Horizon3.ai Raises $100 Million in Series D Funding appeared first on SecurityWeek.

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal

Many security professionals feel pressured to pursue leadership roles, but success can also mean going deeper, not just higher. The post Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal appeared first ...

SAML SSO: 8 Easy Steps to Understand How It Works (2025 Guide)

SAML SSO: How It Works in 8 Simple Steps (2025) SAML SSO is one of the most popular ways to simplify and secure user login for businesses and applications. In this guide, we’ll explain what SAML SSO is, how it works step-by-step, and why many ...

Chrome, Firefox Updates Resolve High-Severity Memory Bugs

Google and Mozilla have released patches for a combined total of four high-severity memory bugs in Chrome and Firefox. The post Chrome, Firefox Updates Resolve High-Severity Memory Bugs appeared first on SecurityWeek.

Apache Kafka Arbitrary File Read and SSRF Vulnerability (CVE-2025-27817)

Overview Recently, NSFOCUS CERT detected that Apache issued a security bulletin to fix the arbitrary file read and SSRF vulnerabilities in Apache Kafka (CVE-2025-27817); Because the Apache Kafka client does not strictly validate and restrict user ...