Application Security News and Articles


Cyber turbulence ahead as airlines strap in for a security crisis

Aircraft systems are getting more connected and ground operations increasingly integrated, and attackers are taking notice. They’re shifting from minor disruptions to targeting critical systems with serious intent. Any time an aircraft ...

Are your employees using Chinese GenAI tools at work?

Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 ...

Microsoft SharePoint servers under attack via zero-day vulnerability with no patch (CVE-2025-53770)

Attackers are exploiting a zero-day variant (CVE-2025-53770) of a SharePoint remote code execution vulnerability (CVE-2025-49706) that Microsoft patched earlier this month, the company has confirmed on Saturday. CVE-2025-53770 is being leveraged ...

The Day GitHub Copilot Wrote a Vulnerability Into Our Codebase

I was reviewing a junior developer’s pull request when my stomach dropped.Continue reading on DevSecOps & AI »

SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available

Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately. The post SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – ...

Week in review: Google fixes zero-day vulnerability in Chrome, critical SQL injection flaw in FortiWeb

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558) For the fifth time this year, Google has patched a Chrome zero-day ...

Score Your Share of AirSwap's Bonus Rollout and Enjoy lucrative rewards

Step-by-step directions to collect sAST through this bonus rollout.Continue reading on Medium »

Unlock the Secrets of $sAST and Start Growing Your Crypto Portfolio

Discover how to unlock $sAST and grow your crypto portfolio with free tokens .Continue reading on Medium »

Unlock the Secrets of $sAST and Start Growing Your Crypto Portfolio

Discover how to unlock $sAST and grow your crypto portfolio with free tokens .Continue reading on Medium »

Google Sues the Operators Behind the BadBox 2.0 Botnet

Google is suing the operators behind BadBox 2.0, accusing multiple Chinese threat groups of playing different roles in the operation of the massive botnet that rolled up more than 10 million devices to run large-scale ad fraud and other malicious ...

Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’

All Your UAVs Are Belong to UKR: Ukrainian Cyber Alliance and Black Owl team up to hack manufacturer of Russian military drones, sources say. The post Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’ appeared first on Security ...

The Challenges of Operationalizing Threat Intelligence

Most security teams subscribe to more threat‑intel feeds than they can digest, yet attackers keep winning. Cyware’s Jawahar Sivasankaran explains why: Outside the Fortune 500 and federal agencies, many organizations still treat ...

In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass

Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves bypassing FIDO keys.  The post In Other News: Law Firm Hacked by China, ...

IDOR: Como Identificar e Corrigir Esta Vulnerabilidade Crítica em APIs

Uma abordagem prática para desenvolvedores sobre Insecure Direct Object ReferenceContinue reading on Medium »

Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks

Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025 The post Summer Vacation Alert Surfaces More ...

Email Protection Startup StrongestLayer Emerges From Stealth Mode

AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding. The post Email Protection Startup StrongestLayer Emerges From Stealth Mode appeared first on SecurityWeek.

Cambodia Arrests More Than 1,000 in Cyberscam Crackdown

Cambodian police and military arrested more than 1,000 people in a crackdown on cyberscam operations that have proliferated in recent years in Southeast Asia and now are spreading globally, ensnaring hundreds of thousands of people in human ...

Critical MCP Vulnerabilities are Slipping Through the Cracks

We must pay attention to what holds everything together - the glue. That’s where the real MCP vulnerabilities are hiding.  The post Critical MCP Vulnerabilities are Slipping Through the Cracks appeared first on Security Boulevard.

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication

Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly. The post Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication appeared first on SecurityWeek.

1.4 Million Affected by Data Breach at Virginia Radiology Practice

Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.  The post 1.4 Million Affected by Data Breach at Virginia Radiology Practice appeared first on SecurityWeek.