Application Security News and Articles


LLM09: Misinformation – FireTail Blog

Nov 21, 2025 - Lina Romero - In 2025, Artificial Intelligence is everywhere, and so are AI vulnerabilities. In fact, according to our research, these vulnerabilities are up across the board. The OWASP Top 10 list of Risks to LLMs can help teams ...

State of Cybersecurity 2025 for USA MSPs/MSSPs: Challenges, Threats, and the Seceon Platform Solution

Introduction: The Cybersecurity Crisis for Service Providers The landscape of cybersecurity for USA Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) in 2025 is defined by unprecedented complexity, operational ...

NDSS 2025 – A Key-Driven Framework For Identity-Preserving Face Anonymization

SESSION Session 3D: Al Safety ----------- ----------- Authors, Creators & Presenters: Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai ...

In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring

Other noteworthy stories that might have slipped under the radar: surge in Palo Alto Networks scanning, WEL Companies data breach impacts 120,000 people, AI second-order prompt injection attack. The post In Other News: ATM Jackpotting, ...

Workload And Agentic Identity at Scale: Insights From CyberArk’s Workload Identity Day Zero

On the eve of KubeCon 2025, experts from companies like Uber, AWS, and Block shared how SPIRE and workload identity fabrics reduce risk in complex, cloud-native systems. The post Workload And Agentic Identity at Scale: Insights From ...

Technical Debt vs Innovation Debt: Why Both Slow You Down, but Only One Threatens Your Future in the Age of AI

Technical debt slows delivery. Innovation debt stops progress. Most companies understand the first. Few acknowledge the second. Technical debt shows up when your systems struggle...Read More The post Technical Debt vs Innovation Debt: Why Both ...

Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework

Cyber agencies call on ISPs to help combat "bulletproof" internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection ...

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day

CVE-2025-61757 is an unauthenticated remote code execution vulnerability affecting Oracle Identity Manager. The post Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day appeared first on SecurityWeek.

Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise

The number of participants in the cyber and physical grid security exercise increased by nearly 50% compared to two years ago. The post Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise appeared first on SecurityWeek.

Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence

In today’s fast-evolving digital world, organizations increasingly rely on hybrid workforces, cloud-first strategies, and distributed infrastructures to gain agility and scalability. This transformation has expanded the network into a complex ...

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

The vulnerabilities could be exploited to cause a denial-of-service (DoS) condition, execute arbitrary code, or access arbitrary files and directories. The post SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance appeared ...

Salesforce Gainsight compromise: Early findings and customer guidance

In the wake of Salesforce’s announcement about “unusual activity involving Gainsight-published applications” and the company’s revocation of access and refresh tokens associated with them, Gainsight has been doing a good ...

What’s New in Cloud Monitor & Classroom Manager: Smarter Tools for K–12 Classrooms

At ManagedMethods, we’re always listening and thinking about how we can make our cybersecurity, student safety, and classroom management products simpler and more effective for educators and IT leaders.  This Fall, we’re excited to share ...

AI as Cyberattacker

From Anthropic: In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign. The attackers used AI’s “agentic” capabilities to an unprecedented degree­—using ...

APIs Are the Retail Engine: How to Secure Them This Black Friday

Can you ever imagine the impact on your business if it went offline on Black Friday or Cyber Monday due to a cyberattack?  Black Friday is the biggest day in the retail calendar. It’s also the riskiest. As you gear up for huge surges in online ...

Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks

APT24 has been relying on various techniques to drop the BadAudio downloader and then deploy additional payloads. The post Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks appeared first on SecurityWeek.

SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability

SquareX claims to have found a way to abuse a hidden Comet API to execute local commands, but Perplexity says the research is fake. The post SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability appeared first on SecurityWeek.

Runlayer Emerges From Stealth Mode With $11 Million in Funding

The company has operated in stealth mode for four months and has signed dozens of customers, including eight unicorns. The post Runlayer Emerges From Stealth Mode With $11 Million in Funding appeared first on SecurityWeek.

Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers

Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. The post Protecting User Data While Boosting Visibility: Secure SEO Strategies for ...

Scaling Cyber: meet the next cybersecurity global leaders

Agentic Threat Hunting, Predictive Threat Intelligence, Disinformation Security & Cyber Deception and more The post Scaling Cyber: meet the next cybersecurity global leaders appeared first on Security Boulevard.