Application Security News and Articles


Azure AI Search Introduces Agentic Retrieval for Enhanced Relevance

Azure AI Search's agentic retrieval, enhancing conversational AI relevance by up to 40%. Learn how it transforms query management today! The post Azure AI Search Introduces Agentic Retrieval for Enhanced Relevance appeared first on Security ...

Chrome to Distrust Chunghwa Telecom and Netlock Certificates

Patterns of concerning behavior led Google to remove trust in certificates from Chunghwa Telecom and Netlock from Chrome. The post Chrome to Distrust Chunghwa Telecom and Netlock Certificates appeared first on SecurityWeek.

Alleged Conti, TrickBot Gang Leader Unmasked

Russian national Vitaly Nikolaevich Kovalev is believed to be the leader of the Conti and TrickBot cybercrime groups. The post Alleged Conti, TrickBot Gang Leader Unmasked appeared first on SecurityWeek.

Technical Details Published for Critical Cisco IOS XE Vulnerability

The critical flaw, tracked as CVE-2025-20188 (CVSS score of 10/10), allows attackers to execute arbitrary code remotely. The post Technical Details Published for Critical Cisco IOS XE Vulnerability appeared first on SecurityWeek.

Build vs. Buy: Panto’s Take on AI Code Reviews and Code Security | Panto AI

As we talk to CTOs and engineering leaders, a common refrain we hear is, “We could just build this ourselves.” The idea of a custom…Continue reading on Medium »

Introducing Panto Security: The Complete Solution for Static and Dynamic Analysis | Panto AI

Customer:  “The Wall of Defense works great for dynamic analysis, but we need Panto to also do static analysis and provide feedback to…Continue reading on Medium »

Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Counter antivirus services such as AVCheck allow cybercriminals to test whether their malware is detected by antivirus products. The post Counter Antivirus Service AVCheck Shut Down by Law Enforcement appeared first on SecurityWeek.

May Recap: New AWS Services and Privileged Permissions 

As May 2025 comes to a close, we’re back with the latest roundup of AWS privileged permission updates and service-level developments reshaping cloud security. Tracking these changes is essential, as newly introduced permissions often grant deep ...

US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles

Elected officials, business executives and other prominent figures in recent weeks received messages from someone impersonating Susie Wiles. The post US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles ...

In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked

Noteworthy stories that might have slipped under the radar: simple PoC code released for Fortinet zero-day, OpenAI O3 disobeys shutdown orders, source code of SilverRAT emerges online. The post In Other News: PoC for Fortinet Bug, AI Model ...

OAuth 2.0 in Practice: Building an OAuth Client

Explore OAuth 2.0 implementation by building your own client. Understand client credentials, access tokens, authorization code flow, and secure integration techniques. The post OAuth 2.0 in Practice: Building an OAuth Client appeared first on ...

Product showcase: Smarter pentest reporting and exposure management with PlexTrac

The threat landscape is evolving faster than ever. Staying ahead means going beyond automated scans and check-the-box assessments. It demands continuous, hands-on testing through a security approach that proactively identifies, prioritizes, and ...

CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, ...

Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how pentesters are using the tool. It mostly succeeds, with some caveats ...

Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of cybersecurity incidents. He discusses how AI can transform SAT into a ...

48% of security pros are falling behind compliance requirements

32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting they feel uncertain about achieving this near ...

Finding Stability in Cloud-Native Security Solutions

How Critical is Stability in Cloud-Native Security? Stability is an essential aspect of a reliable cloud-native security strategy. Do you ever question, how can a company ensure stability? The answer lies with Non-Human Identities (NHIs) and ...

Six Levers That Quietly Change Your Risk and How to Spot Them

Most people think risk only moves when you add controls, but five other hidden forces are quietly reshaping your exposure behind the scenes. This post breaks down the six levers that actually move the math, so you can stop treating risk like a ...

Future-proofing your enterprise: the role of crypto-agile PKI in long-term security

Traditional PKI creates bottlenecks that slow digital transformation due to manual processes and limited integration. As organizations adopt cloud, DevOps, and Zero Trust, scalable and automated certificate management becomes essential. Modern ...

OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...