Application Security News and Articles


Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding

iCOUNTER, which helps organizations defend against targeted attacks, has launched under the helm of former Mandiant president and COO John Watters. The post Cyber Intelligence Firm iCOUNTER Emerges From Stealth With $30 Million in Funding ...

Google Says AI Agent Thwarted Exploitation of Critical Vulnerability 

Google refused to share any details on how its Big Sleep AI foiled efforts to exploit a SQLite vulnerability in the wild. The post Google Says AI Agent Thwarted Exploitation of Critical Vulnerability  appeared first on SecurityWeek.

China’s Salt Typhoon Hacked US National Guard

Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units. The post China’s Salt Typhoon Hacked US National Guard appeared first on SecurityWeek.

Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty

Cameron John Wagenius pleaded guilty to charges related to hacking into US telecommunications companies. The post Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty appeared first on SecurityWeek.

IoT Security Firm Exein Raises $81 Million 

Italian company Exein has raised €70 million (~$81 million) in a Series C funding round led by Balderton. The post IoT Security Firm Exein Raises $81 Million  appeared first on SecurityWeek.

Chrome Update Patches Fifth Zero-Day of 2025

Google has released a Chrome 138 security update that patches a zero-day, the fifth resolved in the browser this year. The post Chrome Update Patches Fifth Zero-Day of 2025 appeared first on SecurityWeek.

Meme Crimes – Can You Conspire By Meme?

Can a person be convicted of a federal conspiracy solely by posting misleading political memes online, without ever having communicated or knowingly coordinated with their alleged co-conspirators? The post Meme Crimes – Can You Conspire By ...

Product showcase: Enzoic for Active Directory

Enzoic for Active Directory is an easy-to-install plugin that integrates with Microsoft Active Directory (AD) to set, monitor, and remediate unsafe passwords and credentials. In essence, it serves as an always-on sentinel for AD, preventing users ...

Experts unpack the biggest cybersecurity surprises of 2025

2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has caught experts off guard. We asked cybersecurity leaders to share the biggest surprises they’ve seen so far this year and what those ...

Real-world numbers for estimating security audit costs

At the end of Star Wars: A New Hope, Luke Skywalker races through the Death Star trench, hearing the ghostly voice of Obi-Wan Kenobi telling him to trust him. Luke places blind trust in an intangible energy that surrounds him, he defeats Darth ...

Falco: Open-source cloud-native runtime security tool for Linux

Falco is an open-source runtime security tool for Linux systems, built for cloud-native environments. It monitors the system in real time to spot unusual activity and possible security threats. Falco is a graduated project from the Cloud Native ...

Most cybersecurity risk comes from just 10% of employees

A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report ...

Virtual Event Preview: Cloud & Data Security Summit 2025 – Tackling Exposed Attack Surfaces in the Cloud

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security. The post Virtual Event Preview: ...

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Obfuscated JavaScript code is embedded within SVG files for browser-native redirection to malicious pages. The post Threat Actors Use SVG Smuggling for Browser-Native Redirection appeared first on SecurityWeek.

Code Execution Through Email: How I Used Claude to Hack Itself

You don’t always need a vulnerable app to pull off a successful exploit. Sometimes all it takes is a well-crafted email, an LLM agent, and a few “innocent” plugins. This is the story of how I used a Gmail message to trigger code execution ...

NETSCOUT Adaptive Threat Analytics improves incident response

NETSCOUT announced Adaptive Threat Analytics, a new enhancement to its Omnis Cyber Intelligence Network Detection and Response (NDR) solution, designed to improve incident response and reduce risk. Adaptive Threat Analytics enables security teams ...

Hacked Elmo X Account Spews Racist, Antisemitic Posts

A hacker accessed the X account of beloved Sesame Street character Elmo, which included racist and antisemitic posts and a foul tirade about Trump and Jeffrey Epstein. The incident came a week after xAI's Grok chatbot spewed antisemitic and white ...

Palo Alto Networks Extends Zero-Trust Alliance with Okta

Palo Alto Networks today extended its alliance with Okta to provide deeper integrations to enable cybersecurity teams to restrict which applications can be accessed from a secure browser. The post Palo Alto Networks Extends Zero-Trust Alliance ...

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation

UEFI firmware running on 100+ Gigabyte motherboard models is affected by memory corruption vulnerabilities that may allow attackers to install persistent and difficult-to-detect bootkits (i.e., malware designed to infect the computer’s boot ...

F5 accelerates application delivery and security

F5 announced new tools to reduce the immense complexity cross-functional operations (XOps) teams face in managing hybrid, multicloud, and AI-driven application environments. F5 AI Assistant now provides a single natural language interface across ...