Application Security News and Articles


Enterprise printer security fails at every stage

Printer platform security is often overlooked in enterprise security strategies, creating security gaps, according to HP Wolf Security. By addressing security at every stage, organizations can strengthen their defenses and ensure their print ...

As AI tools take hold in cybersecurity, entry-level jobs could shrink

A new survey from ISC2 shows that nearly a third of cybersecurity professionals are already using AI security tools, and many others are close behind. So far, 30 percent of professionals say they’ve already integrated AI into their operations, ...

Cybersecurity jobs available right now: July 22, 2025

CISO Kbrw | France | Hybrid – View job details As a CISO, you will develop risk management processes aligned with company goals and enforce cybersecurity policies compliant with ISO27001, NIS2, and SOC2. You will handle ...

Hackers Exploiting Microsoft Flaw to Attack Governments, Businesses

Hackers are exploiting a significant Microsoft vulnerability chain that allows them gain control of on-premises SharePoint servers, steal cryptographic keys, and access Windows applications like Outlook, Teams, and OneDrive. It also gives them ...

Iranian APT Targets Android Users With New Variants of DCHSpy Spyware

Iranian APT MuddyWater has been using new versions of the DCHSpy Android surveillance tool since the beginning of the conflict with Israel. The post Iranian APT Targets Android Users With New Variants of DCHSpy Spyware appeared first on SecurityWeek.

Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)

Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution to gain administrative access to vulnerable deployments. It’s currently unclear what the attackers are using this ...

Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025‑54309)

Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution to gain administrative access to vulnerable deployments. It’s currently unclear what the attackers are using this ...

Marketing, Law Firms Say Data Breaches Impact Over 200,000 People

Cierant Corporation and Zumpano Patricios independently disclosed data breaches, each impacting more than 200,000 individuals. The post Marketing, Law Firms Say Data Breaches Impact Over 200,000 People appeared first on SecurityWeek.

The Overlooked Risk in AI Infrastructure: Physical Security 

As artificial intelligence (AI) accelerates across industries from financial modeling and autonomous vehicles to medical imaging and logistics optimization, one issue consistently flies under the radar: Physical security.  The post The ...

Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age 

With cyberthreats intensifying and regulatory bodies tightening oversight, securing revenue data in the cloud is essential.  The post Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age  appeared first on Security Boulevard.

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location

A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations. The post Surveillance Firm Bypasses SS7 Protections to Retrieve User Location appeared first on SecurityWeek.

750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service

The Alcohol & Drug Testing Service (TADTS) says personal information was stolen in a July 2024 ransomware attack. The post 750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service appeared first on SecurityWeek.

Cybersecurity Isn’t Just an IT Line Item — It’s a Business Imperative 

Cybersecurity officers need to remember that the reality is, most attacks don’t begin with a dramatic break-in… they start with a login. The post Cybersecurity Isn’t Just an IT Line Item — It’s a Business Imperative  appeared first on ...

Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

Microsoft has started releasing updates to fix the exploited SharePoint zero-days tracked as CVE-2025-53770 and CVE-2025-53771. The post Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers appeared first on ...

The Expiring Trust Model: CISOs Must Rethink PKI in the Era of Short-Lived Certificates and Machine Identity 

The way we manage certificates must transform. For CISOs, this is not a future problem; the time to re-architect digital trust is now. The post The Expiring Trust Model: CISOs Must Rethink PKI in the Era of Short-Lived Certificates and Machine ...

Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Hackers are exploiting a zero-day vulnerability in CrushFTP to gain administrative privileges on vulnerable servers via HTTPS. The post Exploited CrushFTP Zero-Day Provides Admin Access to Servers appeared first on SecurityWeek.

Who’s Watching You? FBI IG Looks to Plug Holes in Ubiquitous Technical Surveillance 

Security gaps, coupled with savvy cybercriminals, lend urgency to mitigating the potential for exploitation posed by surveillance tech. The post Who’s Watching You? FBI IG Looks to Plug Holes in Ubiquitous Technical Surveillance  appeared ...

How to land your first job in cybersecurity

According to LinkedIn, job applications have surged over 45% in the past year, with 11,000 applications submitted every minute. This flood of applications is making it harder than ever for qualified candidates to stand out. The industry has ...

World Health Organization CISO on securing global health emergencies

In this Help Net Security interview, Flavio Aggio, CISO at the World Health Organization (WHO), explains how the organization prepares for and responds to cyber threats during global health emergencies. These crises often lead to an increase in ...

Calico: Open-source solution for Kubernetes networking, security, and observability

Calico is an open-source unified platform that brings together networking, security, and observability for Kubernetes, whether you’re running in the cloud, on-premises, or at the edge. The solution uses the lowest amount of processing ...