Application Security News and Articles


ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the ...

Google Researchers Find New Chrome Zero-Day

Reported by the Google Threat Analysis Group, the vulnerability might have been exploited by commercial spyware. The post Google Researchers Find New Chrome Zero-Day appeared first on SecurityWeek.

Scammers are impersonating Interactive Brokers: Here’s what you need to know

Interactive Brokers is warning customers to be on high alert due to a wave of scams involving fraudsters posing as company representatives. Interactive Brokers (IBKR) is a global brokerage firm that lets investors trade stocks, options, futures, ...

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute. The post Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names appeared first on SecurityWeek.

How global collaboration is hitting cybercriminals where it hurts

In this Help Net Security interview, William Lyne, Deputy Director of UK’s National Crime Agency, discusses the cybercrime ecosystem and the threats it enables. He explains how cybercrime is becoming more accessible and fragmented. Lyne ...

Multiple High-Risk Vulnerabilities in Microsoft Products

According to the latest advisory by Cert-In, 78 vulnerabilities have been discovered across a broad range of Microsoft products, including Windows, Azure, MS Office, Developer Tools, Microsoft Apps, System Center, Dynamics, and even legacy ...

Conquering complexity and risk with data security posture insights

Conquering complexity and risk with data security posture insights madhav Tue, 06/03/2025 - 05:35 In today’s competitive landscape it has become an increasingly important for businesses looking for ways to adapt their data security, ...

Vet: Open-source software supply chain security tool

Vet is an open source tool designed to help developers and security engineers spot risks in their software supply chains. It goes beyond traditional software composition analysis by detecting known vulnerabilities and flagging malicious packages. ...

Bankers Association’s attack on cybersecurity transparency

A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public ...

Development vs. security: The friction threatening your code

Developers are driven to deliver new features quickly, while security teams prioritize risk mitigation, which often puts the two at odds. 61% of developers said that it’s critical that security doesn’t block or decelerate the development ...

Cybersecurity jobs available right now: June 3, 2025

The post Cybersecurity jobs available right now: June 3, 2025 appeared first on Help Net Security.

The identity crisis at the heart of the AI agent revolution

AI agents are becoming the new interface for enterprise work, helping teams write code, automate operations, and execute transactions. But as organizations lean into Agentic AI, a foundational blind spot is coming into view: Today’s identity ...

The hidden identity challenges of deploying AI agents across hybrid environments

As AI agents rapidly move from proof-of-concept to production, enterprises are running headfirst into a new set of challenges — ones that traditional identity and access management (IAM) systems simply weren’t built to solve. These agents ...

How Morpheus AI Automates the Entire L1 & L2 Pipeline

See how Morpheus AI fully automates the L1 & L2 SOC pipeline, triaging 95% of alerts in under 2 minutes and cutting investigation times by 99%. The post How Morpheus AI Automates the Entire L1 & L2 Pipeline appeared first on D3 ...

Double Your Earnings by following our step-by-step Guide for AirSwap $sAST

Proven Methods to Increase Your Staking Earnings with AirSwap $sASTContinue reading on Medium »

Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed

Luxury brand Cartier disclosed a data breach in which an unauthorized party gained access to its systems and obtained some client information. The post Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed appeared ...

What You Don’t Know About SaaS Can Violate HIPAA Compliance

Explore how SaaS identity risks impact HIPAA compliance and what the 2025 updates mean for MFA, app inventory, and third-party software controls. Read now. The post What You Don’t Know About SaaS Can Violate HIPAA Compliance appeared first on ...

Are You Using the Right ITDR Security Solution? | Grip

Learn how identity threats are evolving and what a modern ITDR security solution must deliver to prevent, detect, and resolve risks across SaaS environments. The post Are You Using the Right ITDR Security Solution? | Grip appeared first on ...

How Secure is Your Data Against NHIs Attacks?

Are Your Secrets Safe from NHIs Attacks? With cybersecurity strategies continue to evolve, one area of particular focus is non-human identities (NHIs) and secrets security. NHIs, or machine identities, comprise a “Secret” (an encrypted ...

Are Your Systems Capable of Detecting NHIDR?

Can Your Systems Successfully Detect NHIDR? Have you considered whether your systems can successfully detect Non-Human Identity and Data Risk (NHIDR)? The advent of cloud computing has drastically increased the use of machine identities, ...