Application Security News and Articles


Not All Multipath Is Created Equal

We live in a world obsessed with speed and reliability. Whether it's streaming our favorite shows, conducting mission-critical business operations, or simply browsing the web, we demand seamless connectivity. This has led to the rise of many ...

Cyberattack Knocks Texas City’s Systems Offline

The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack. The post Cyberattack Knocks Texas City’s Systems Offline appeared first on SecurityWeek.

GUEST ESSAY: Ponemon study warns: AI-enhanced deepfake attacks taking aim at senior execs

A new study by the Ponemon Institute points to a concerning use of AI: deepfake attacks are on the rise and are taking a financial and reputational toll on companies and their executives. Related: Tools to fight deepfakes Deepfake Deception: … ...

Building a Smarter, Safer Grid with IEEE 2030.5 and Certificate Lifecycle Management Automation

The renewable energy landscape is evolving fast—bringing smarter, more sustainable ways to generate, distribute, and use power. At the heart of this transformation is a lesser-known but vital standard: IEEE 2030.5—a foundational protocol that ...

5 Red Team Exercises That Expose Your Real Security Gaps in 2025

Most security tools create a false sense of protection. Explore 5 realistic red team exercises with Notion templates that help you plan tests mirroring sophisticated attackers and identify critical vulnerabilities in your organization The post 5 ...

Perforce Puppet update accelerates vulnerability remediation

Perforce Software announced its latest platform update for Puppet Enterprise Advanced, designed to streamline DevSecOps practices and fortify enterprise security postures. This release incorporates more advanced and proactive remediation options, ...

Getting the Most Value Out of the OSCP: The Exam

A practical guide to maximizing the short- and long-term benefits of your upcoming OSCP exam attempt(s). Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance with OffSec’s ...

A Comparative Analysis of Anthropic’s Model Context Protocol and Google’s Agent-to-Agent Protocol

As AI agents transform enterprise technology, two critical protocols are emerging as industry standards: Anthropic's MCP for connecting AI to data sources and Google's A2A for agent collaboration. This analysis breaks down how these frameworks ...

1Password Extends Reach of IAM Platform to AI Agents and Unmanaged Devices

1Password today extended the reach of its Extended Access Management (XAM) platform to include an ability to secure artificial intelligence (AI) agents. The post 1Password Extends Reach of IAM Platform to AI Agents and Unmanaged Devices appeared ...

Ketch Data Sentry uncovers hidden privacy risks

Ketch launched Data Sentry, a frontend data map for detecting website privacy risks. Designed for privacy and security teams, Data Sentry provides real-time visibility into website data flows—pinpointing hidden vulnerabilities before they lead ...

Augmented, Not Replaced – Humans Outpace AI in Simbian’s SOC Hackathon Championship – Results and Winners Announced!

Simbian's industry-first AI SOC Hackathon Championship has concluded, bringing with it an exciting glimpse into the future of cybersecurity operations. The post Augmented, Not Replaced – Humans Outpace AI in Simbian’s SOC Hackathon ...

ConfusedComposer: A Privilege Escalation Vulnerability Impacting GCP Composer

Tenable Research discovered a privilege-escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ConfusedComposer. The vulnerability could have allowed an identity with permission ...

Beyond Free Breach-Check Tools

Why Enzoic Delivers Enterprise-Grade Continuous Credential Monitoring Helpful for Individuals, Not Enough for Enterprises In recent years, free services like Have I Been Pwned (HIBP) have helped raise awareness around the dangers of password ...

Understanding disposable emails

Disposable email addresses are temporary inboxes that allow users to receive messages without linking the address to a long-term identity. Unlike Gmail or Outlook, which are built for ongoing use and personal association, disposable email ...

Proofpoint Prime unifies multistage attack protection across digital channels

Proofpoint has unveiled the global availability of Proofpoint Prime Threat Protection, the human-centric cybersecurity solution that brings together previously disparate critical threat defense capabilities—protection against multistage attacks ...

SSL.com Scrambles to Patch Certificate Issuance Vulnerability 

A vulnerability in SSL.com has resulted in nearly a dozen certificates for legitimate domains being wrongly issued. The post SSL.com Scrambles to Patch Certificate Issuance Vulnerability  appeared first on SecurityWeek.

PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)

There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last week. “All users running an SSH server based on the Erlang/OTP SSH library are ...

Beyond Firewalls: Why Phishing Demands a People-First, Trust-Centric Response 

Phishing attacks are not only more frequent but also more sophisticated, leveraging AI to craft highly convincing messages that bypass traditional security measures.​  The post Beyond Firewalls: Why Phishing Demands a People-First, ...

Survey Surfaces Challenges Securing SaaS Applications

A survey of 420 responses from IT and security professionals finds 86% now view securing software-as-a-service (SaaS) applications as a top priority, with more than three-quarters (76%) having increased budget allocations. The post Survey ...

Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding

Hopper has emerged from stealth mode with a solution designed to help organizations manage open source software risk. The post Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding appeared first on SecurityWeek.