Application Security News and Articles


Critical Next.js Vulnerability in Hacker Crosshairs

Threat actors have started probing servers impacted by a critical-severity vulnerability in the web application development framework Next.js. The post Critical Next.js Vulnerability in Hacker Crosshairs appeared first on SecurityWeek.

Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack

Despite Oracle categorically denying that its Cloud systems have been breached, sample data released by the hacker seems to prove otherwise. The post Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack appeared first on SecurityWeek.

AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection?

AI allows cybercriminals to circumvent traditional detection systems, and they continue to develop sophisticated methods to enable this. The post AI vs. Cybercriminals: Who Wins the Race in Next-Gen Threat Detection? appeared first on Security ...

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority

It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as doctors and nurses ...

Sumsub launches Reusable Digital Identity product suite

Sumsub is launching its Reusable Digital Identity product suite. It will mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings ...

Chainguard VMs reduces risk and engineering complexity

Chainguard announced Chainguard VMs, a new product line offering minimal, zero-CVE virtual machine images built entirely from source. Purpose-built for modern, ephemeral workloads in the cloud, Chainguard VMs represent a stark contrast to the ...

Cycode Expands Complete ASPM to Secure Non-human Identities (NHIs)

Inventory, classify, and correlate NHIs with Cycode's leading secrets engine to identify, prioritize, and fix the NHI risks that matter faster. The post Cycode Expands Complete ASPM to Secure Non-human Identities (NHIs) appeared first on ...

BrowserStack Private Devices helps organizations comply with stringent security requirements

BrowserStack launched Private Devices, expanding its enterprise portfolio to address the specialized testing needs of organizations with stringent security requirements. Private Devices offers exclusive access to customized real devices housed in ...

Cyberhaven enhances Linea AI platform to improve data security

Cyberhaven announced a major enhancement to its Linea AI platform with the introduction of advanced content understanding capabilities powered by frontier AI models. This enables Linea AI to intelligently analyze and contextualize all forms of ...

A CISO’s guide to securing AI models

In AI applications, machine learning (ML) models are the core decision-making engines that drive predictions, recommendations, and autonomous actions. Unlike traditional IT applications, which rely on predefined rules and static algorithms, ML ...

Malwoverview: First response tool for threat hunting

Malwoverview is an open-source threat hunting tool designed for the initial triage of malware samples, URLs, IP addresses, domains, malware families, IOCs, and hashes. “Malwoverview is simple and direct, integrating multiple public ...

How does your data end up on the dark web?

The dark web is a hidden corner of the internet where people can remain anonymous. It’s often confused with the deep web, but they’re not quite the same thing. The deep web is just everything online that’s not indexed by search engines. ...

War Plan Chat Includes Journalist

Journalists aren’t usually invited to online chats about US war plans. This seemed obvious until yesterday, when Atlantic editor Jeffrey Goldberg published his article about being a lurker in an online chat with US Secretaries of State, ...

News alert: RSAC 2025 ramps up – watch Byron Acohido on Bospar’s Politely Pushy podcast

The annual pilgrimage to San Francisco for RSA Conference is fast approaching—and the ramp-up has officially begun. In the latest episode of Bospar’s Politely Pushy podcast, Last Watchdog Editor-in-Chief Byron V. Acohido joins DigiCert’s ...

Google Patches Chrome Sandbox Escape Zero-Day Caught by Kaspersky

The vulnerability, tracked as CVE-2025-2783, was chained with a second exploit for remote code execution in attacks in Russian. The post Google Patches Chrome Sandbox Escape Zero-Day Caught by Kaspersky appeared first on SecurityWeek.

News alert: IDT Corp., AccuKnox partner to deploy runtime security-powered CNAPP at the edge of IoT

FinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy runtime security-powered CNAPP (Cloud Native Application Protection Platform) for IoT/Edge Security. Menlo Park, Calif., Mar. 25, 2025, CyberNewswire — ...

Understanding RDAP: The Future of Domain Registration Data Access

The domain name system (DNS) is an essential component of the internet, allowing users to access websites using human-readable domain names instead of complex IP addresses. Behind every domain name is registration data that contains vital ...

BSidesLV24 – IATC – Health Care Is In Intensive Care

Author/Presenter: Christian Dameff Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

The Password Hygiene Failure That Cost a Job | Grip Security

Actions from a real-life breach raises questions about poor password hygiene accountability and why users, policies, and security controls must work together. The post The Password Hygiene Failure That Cost a Job | Grip Security appeared first on ...

GitGuardian’s Secrets Risk Assessment: Know Your True Exposure For Free

Go beyond GitHub's scope. Understand the full picture of your secret leaks with GitGuardian, covering public and internal exposures. The post GitGuardian’s Secrets Risk Assessment: Know Your True Exposure For Free appeared first on Security ...