Application Security News and Articles


Cambodia Arrests More Than 1,000 in Cyberscam Crackdown

Cambodian police and military arrested more than 1,000 people in a crackdown on cyberscam operations that have proliferated in recent years in Southeast Asia and now are spreading globally, ensnaring hundreds of thousands of people in human ...

Critical MCP Vulnerabilities are Slipping Through the Cracks

We must pay attention to what holds everything together - the glue. That’s where the real MCP vulnerabilities are hiding.  The post Critical MCP Vulnerabilities are Slipping Through the Cracks appeared first on Security Boulevard.

Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication

Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly. The post Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication appeared first on SecurityWeek.

1.4 Million Affected by Data Breach at Virginia Radiology Practice

Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.  The post 1.4 Million Affected by Data Breach at Virginia Radiology Practice appeared first on SecurityWeek.

Fraud: A Growth Industry Powered by Gen-AI

With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic. The post Fraud: A Growth Industry Powered by Gen-AI appeared first on SecurityWeek.

CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable

The CitrixBleed 2 vulnerability in NetScaler may expose organizations to compromise even if patches have been applied. The post CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable appeared first on SecurityWeek.

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet

Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices. The post Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet appeared first on SecurityWeek.

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking

Wiz researchers discovered NVIDIAScape, an Nvidia Container Toolkit flaw that can be exploited for full control of the host machine. The post Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking appeared first on SecurityWeek.

Anne Arundel Dermatology Data Breach Impacts 1.9 Million People

Anne Arundel Dermatology said hackers had access to its systems for three months and may have stolen personal and health information.  The post Anne Arundel Dermatology Data Breach Impacts 1.9 Million People appeared first on SecurityWeek.

Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders

A settlement has been reached in the class action brought by investors against Meta over the Cambridge Analytica incident, but details have not been shared. The post Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and ...

Strata Identity provides identity guardrails and observability for AI agents

Strata Identity introduced a new product, Identity Orchestration for AI Agents. Built on Strata’s Maverics vendor-agnostic identity fabric and hybrid air-gap architecture, it provides identity guardrails and observability for AI agents without ...

Why we must go beyond tooling and CVEs to illuminate security blind spots

In April, the cybersecurity community held its breath as the Common Vulnerabilities and Exposures (CVE) program was plunged into a moment of existential crisis. In the end, an eleventh-hour reprieve saved the day. While CVEs do not encompass the ...

Making security and development co-owners of DevSecOps

In this Help Net Security interview, Galal Ibrahim Maghola, former Head of Cybersecurity at G42 Company, discusses strategic approaches to implementing DevSecOps at scale. Drawing on experience in regulated industries such as finance, telecom, ...

AI adoption is booming but secure scaling not so much

96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly ...

Buy Now, Pay Later… with your data

Buy Now, Pay Later (BNPL) apps are everywhere these days. Whether you’re buying sneakers or groceries, chances are you’ve seen the option to split your payments over time. It’s quick and easy. But behind the convenience is a growing privacy ...

New infosec products of the week: July 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from At-Bay, Immersive, NETSCOUT, Socure, and Stellar Cyber. Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience The 6.0.0 ...

Emerging Cloaking-as-a-Service Offerings are Changing Phishing Landscape

Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing or other malicious site to targets and harmless ones to detection and blocking tools, techniques that SlashNext ...

1Password Adds MCP Server to Trelica Governance Platform

1Password this week announced it has added a Model Context Protocol (MCP) server to the Trelica governance platform for software-as-a-service (SaaS) applications it acquired earlier this year. In addition, the MCP Server for Trelica by 1Password ...

Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing

Researchers discovered a security flaw in Google's Gemini AI chatbot that could put the 2 billion Gmail users in danger of being victims of an indirect prompt injection attack, which could lead to credentials being stolen or phishing attacks. The ...

Empirical Security Raises $12 Million for AI-Driven Vulnerability Management

Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform.  The post Empirical Security Raises $12 Million for AI-Driven Vulnerability Management appeared first on SecurityWeek.