Application Security News and Articles


Is it Illegal to Listen to a Podcast or Watch a Movie Online?

Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online? The post Is it Illegal to Listen to a Podcast or Watch a Movie Online? appeared first on Security Boulevard.

Modern Threats, Missed Phish: How Exposed Are You? (Part 2)

Alright, you’ve come this far. You’ve admitted that your SEG isn’t exactly the security soulmate you thought it was. Maybe you’ve even started to notice the red flags – missed phishes, frustrated clients, constant rule tuning. But ...

From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries. The post From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth appeared first on SecurityWeek.

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)

A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by adding the flaw to its Known Exploited Vulnerabilities catalog. About CVE-2025-4664 CVE-2025-4664 stems ...

Cranium introduces AI red teaming platform

Cranium has launched Arena, an AI red teaming platform built to proactively test and secure AI systems across the full model and supply chain lifecycle. As artificial intelligence continues its rapid integration into enterprise infrastructure, ...

Russian APT Exploiting Mail Servers Against Government, Defense Organizations

Russia-linked APT28 has been exploiting mail server vulnerabilities against government and defense entities since September 2023. The post Russian APT Exploiting Mail Servers Against Government, Defense Organizations appeared first on SecurityWeek.

SHARED INTEL Q&A: AI in the SOC isn’t all about speed — it’s more so about smoothing process

The SOC has long been the enterprise’s first line of defense. But despite years of investment in threat feeds and automation platforms, the same question persists: why does intelligence still struggle to translate into timely action? Related: ...

FBI Warns of Deepfake Messages Impersonating Senior Officials

The FBI says former federal and state government officials are targeted with texts and AI-generated voice messages impersonating senior US officials. The post FBI Warns of Deepfake Messages Impersonating Senior Officials appeared first on ...

IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience

In an industry currently full of noise, new logos and two-letter slides, IBM is proving that real security transformation in the AI revolution takes more than a lofty latte imbued vision.  The post IBM Reasserts Its Identity: A Modern Security ...

Why Sectigo is the best Certificate Authority for your security needs

Security and trust are paramount. Whether you're running a small business or managing enterprise-level IT infrastructure, choosing the right Certificate Authority (CA) is crucial. A CA acts as a trusted authority that issues, verifies, and ...

Securing Critical Infrastructure: GitGuardian Partners with ONE-ISAC to Protect Oil & Natural Energy Operations

This collaboration brings GitGuardian's expertise in secrets detection and non-human identity protection to the oil and natural energy sector, addressing unique challenges in operational technology environments. The post Securing Critical ...

Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025

Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits. The post Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 appeared first on SecurityWeek.

Deepfake attacks could cost you more than money

In this Help Net Security interview, Camellia Chan, CEO at X-PHY, discusses the dangers of deepfakes in real-world incidents, including their use in financial fraud and political disinformation. She explains AI-driven defense strategies and ...

Polymorphic phishing attacks flood inboxes

AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense. In 2024, researchers tracked one malicious email every 42 seconds. Many of the 42-second attacks were part of ...

Cybersecurity Skills Framework connects the dots between IT job roles and the practical skills needed

The Linux Foundation, in collaboration with OpenSSF and Linux Foundation Education, has released the Cybersecurity Skills Framework, a global reference guide that helps organizations identify and address critical cybersecurity competencies across ...

How working in a stressful environment affects cybersecurity

Stressful work environments don’t just erode morale, they can quietly undermine cybersecurity. When employees feel overworked, unsupported, or mistreated, their judgment and decision-making suffer. “From an organizational perspective, a ...

New infosec products of the week: May 16, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Hunted Labs, McAfee, Obsidian Security, PentestPad, Resecurity, and SecuX. Resecurity One simplifies cybersecurity operations Resecurity One provides ...

Ivanti Endpoint Manager Mobile Authentication Bypass and Remote Code Execution Vulnerability (CVE-2025-4427/CVE-2025-4428)

Recently, NSFOCUS CERT detected that Ivanti issued a security advisory to fix the authentication bypass and remote code execution vulnerabilities (CVE-2025-4427/CVE-2025-4428) in Ivanti Endpoint Manager Mobile (EPMM). At present, both 2 ...

Are You Using the Right SSPM Software? | Grip Security

Not all SSPM tools and SSPM software technology are created equal. Learn what an SSPM should do, and how to choose a solution that keeps up with your SaaS use. The post Are You Using the Right SSPM Software? | Grip Security appeared first on ...

Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List

Once a key figure in the Angler exploit kit underworld, Tarasov’s life has unraveled into detention, paranoia, and an unwanted return to the Russia he publicly despised. The post Andrei Tarasov: Inside the Journey of a Russian Hacker on the ...