Application Security News and Articles


BalkanID IGA Lite reduces identity risk and ensures compliance

BalkanID has unveiled its self-service Identity Governance and Administration (IGA) Lite Platform, offering flexibility and transparent pricing. Consisting of three streamlined modules: User Access Reviews (UAR) Lite, IAM Risk Analyzer Lite, and ...

OneDrive Gives Web Apps Full Read Access to All Files

Security researchers warn that OneDrive’s file sharing tool may grant third-party web apps access to all your files—not just the one you choose to upload. The post OneDrive Gives Web Apps Full Read Access to All Files appeared first on ...

Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities

Google and Mozilla released patches for Chrome and FireFox to address a total of 21 vulnerabilities between the two browsers, including three rated high severity. The post Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities appeared first ...

Mental Denial of Service: Narrative Malware and the Future of Resilience

Mental denial of service (DOS) is the manipulative content that hijacks the cognitive processing of individuals and institutions. The post Mental Denial of Service: Narrative Malware and the Future of Resilience appeared first on Security Boulevard.

Attackers hit MSP, use its RMM software to deliver ransomware to clients

A threat actor wielding the DragonForce ransomware has compromised an unnamed managed service provider (MSP) and pushed the malware onto its client organizations via SimpleHelp, a legitimate remote monitoring and management (RMM) tool. ...

What are OAuth Grant Types?

Discover the different OAuth grant types, including authorization code, client credentials, and more. Learn how each type works and when to use them for secure API access. The post What are OAuth Grant Types? appeared first on Security Boulevard.

Vulnerabilities in CISA KEV Are Not Equally Critical: Report

New report says organizations should always consider environmental context when assessing the impact of vulnerabilities in CISA KEV catalog. The post Vulnerabilities in CISA KEV Are Not Equally Critical: Report appeared first on SecurityWeek.

The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw

Physicist Neil Johnson explores how fundamental laws of nature could explain why AI sometimes fails—and what to do about it. The post The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw appeared first on ...

$223 Million Stolen in Cetus Protocol Hack

Hackers exploited a vulnerability in Cetus Protocol, a liquidity provider on the SUI blockchain. The post $223 Million Stolen in Cetus Protocol Hack appeared first on SecurityWeek.

NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape

Santa Clara, Calif. May 28, 2025 – Recently, global research and advisory firm Forrester released The Network Analysis and Visibility (NAV) Solutions Landscape, Q2 2025, offering a comprehensive analysis of market dynamics, technology trends, ...

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

Reactive security isn’t just outdated — it’s become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025, I spoke with Derek Manky, ...

Facebook Faces One of the Largest Alleged Data Breaches: 1.2 Billion Accounts at Risk

A hacker known as ByteBreaker has surfaced on underground forums, claiming to have stolen data from 1.2 billion Facebook accounts. While Facebook has not confirmed the breach, the hacker is reportedly selling access to a trove of user ...

Adidas Data Breach Highlights Third-Party Risks: Why AI-Based Cybersecurity Solutions Are Essential

On May 23, Adidas disclosed a data breach resulting from a cyberattack on a third-party customer service provider, exposing sensitive customer information in multiple regions, including the U.S. and Europe. While Adidas did not name the vendor ...

Dior Cyber Attack Exposes Retail Vulnerabilities: Why Threat Detection and Response Must Be a Priority

Luxury fashion giant Dior has confirmed a cyberattack that compromised customer data in parts of Asia. The breach, discovered on May 7, impacted customers in China and South Korea, with attackers gaining unauthorized access to personal ...

The hidden risk lurking in your infrastructure: mismanaged certificates

Mismanaged certificates in hybrid environments pose a critical but often invisible risk to enterprise operations. Expired internal PKI certificates can lead to costly outages, compliance failures, and long-term damage especially in regulated ...

INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East

Cary, North Carolina, 28th May 2025, CyberNewsWire The post INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East appeared first on Security Boulevard.

LogicGate brings risk management to individual business units

LogicGate is elevating its Risk Cloud platform with a new Operational Risk Management (ORM) Solution designed to allow organizations to prioritize risks based on process criticality and financial impact. By helping minimize operational ...

Why data provenance must anchor every CISO’s AI governance strategy

Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording ...

Woodpecker: Open-source red teaming for AI, Kubernetes, APIs

Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams find and fix security weaknesses in AI systems, Kubernetes environments, and APIs before attackers can ...

GitHub becomes go-to platform for malware delivery across Europe

Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe, according to Netskope. Users are now constantly dealing with phishing attempts, which have become so common and ...