Application Security News and Articles


Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning

The US government is again warning about potential Iranian cyberattacks as researchers find that hackers’ favorite ICS targets remain exposed. The post Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning appeared ...

Our pentest quote form saves you time

We are pleased to announce the release of our new penetration testing quote form, which is optimised to save you time. There is no need for a lengthy scoping call, or a long-winded series of technical questions. No excel scoping forms to fill ...

US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes

The US has made 29 searches of known or suspected laptop farms supporting North Korean individuals posing as US IT workers. The post US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes appeared first on SecurityWeek.

Scam centers are spreading, and so is the human cost

Human trafficking tied to online scam centers is spreading across the globe, according to a new crime trend update from INTERPOL. Human trafficking victims by country of origin (Source: INTERPOL) By March 2025, people from 66 countries had been ...

CAPTCHAs 101: what they are, how they work, and where they fall short

CAPTCHAs are the most recognizable anti-bot mechanism on the web. Whether you're logging into a game, signing up for a new service, or checking out online, chances are you've been asked to click on traffic lights, solve a puzzle, or interpret ...

Chrome 138 Update Patches Zero-Day Vulnerability

Google has released a Chrome 138 update that patches a high-severity vulnerability with an exploit in the wild. The post Chrome 138 Update Patches Zero-Day Vulnerability appeared first on SecurityWeek.

AI Is Enhancing The Traditional Pentesting Approach – A Detailed Analysis

For a long time now, traditional pentesting has served as the backbone of proactive cyberdefense strategies across all industries flourishing in the digital realm. Pacing with the time where technology is making history- speed, accuracy, and ...

Tracer AI combats fraud, counterfeits and narrative attacks in ChatGPT

Tracer AI launched Tracer Protect for ChatGPT, a solution that protects brands from the reputational harm being propagated at machine scale via AI chatbots by bad actors. The rising popularity of generative AI (genAI) engines is driving the ...

Federal Reserve System CISO on aligning cyber risk management with transparency, trust

In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to ...

How cybercriminals are weaponizing AI and what CISOs should do about it

In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone. Everyone on the call except the employee was a deepfake. Criminals had used AI-powered ...

DigitalOcean boosts identity management offerings with custom roles

DigitalOcean announced expanded capabilities for its identity management offerings with custom roles, the newest Role-Based Access Control (RBAC) offering for its cloud platform. This offering allows customers to create roles that are ...

GenAI is everywhere, but security policies haven’t caught up

Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work, up ten points in a year, but just under a third of organizations have put formal policies in place, according to new ISACA ...

How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this ...

Cybersecurity jobs available right now: July 1, 2025

Application Security Engineer Fireblocks | Israel | Hybrid – View job details As an Application Security Engineer, you will improve and secure the company’s continuous integration and deployment pipelines through CI/CD security ...

News alert: SquareX research finds browser AI agents are proving riskier than human employees

Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to ...

Why compliance gets easier when you don’t manually manage secrets

Manually managing secrets increases your compliance burden. This article explains what frameworks demand and how managed secrets platforms like Doppler keep you audit-ready. The post Why compliance gets easier when you don’t manually manage ...

Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025

What you need to know about SCA tools Quick Answer: The top SCA tools in 2025 are Mend.io (best for automated remediation and proactive SCA), Sonatype Lifecycle (known for enterprise policy management), Snyk (known for developer experience), and ...

Evaluating AI Solutions for the SOC: Why Centralized Autonomy Outperforms Agentic AI

Compare centralized autonomous SOC engines like Morpheus against agentic AI solutions. Learn why unified control beats agent swarms. The post Evaluating AI Solutions for the SOC: Why Centralized Autonomy Outperforms Agentic AI appeared first on ...

The Rise of Agentic AI: Uncovering Security Risks in AI Web Agents

In our first post, we introduced the world of AI web agents – defining what they are, outlining their core capabilities, and surveying the leading frameworks that make them possible. Now, we’re shifting gears to look at the other side of the ...

The Rise of Agentic AI: From Chatbots to Web Agents

Disclaimer: This post isn’t our usual security-focused content – today we’re taking a quick detour to explore the fascinating world of AI agents with the focus of AI web agents. Enjoy this educational dive as a warm-up before we get into ...