Application Security News and Articles


Prometei Botnet Activity Spikes

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.

Chinese APT Hacking Routers to Build Espionage Infrastructure

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.

Using AI to Identify Patterns in Vishing Attempts

AI-powered defenses offer clear strategic advantages for telecom providers and enterprise security teams to help combat vishing attacks. The post Using AI to Identify Patterns in Vishing Attempts appeared first on Security Boulevard.

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)

A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. The vulnerability has been patched in WinRAR 7.12 beta 1, released on June ...

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices. The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams 

Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them. The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  appeared first on SecurityWeek.

Common Good Cyber Fund launches to support nonprofits protecting the internet

The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk of harassment, harm, or coercion. It has the potential to make cybersecurity better and more accessible for billions of ...

NSFOCUS was Selected as a Representative Provider of Gartner® “Innovation Insight: Adversarial Exposure Validation in China”

SANTA CLARA, Calif., June 24, 2025 – Recently, Gartner released the 2025 “Innovation Insight: Adversarial Exposure Validation in China”¹, NSFOCUS was selected as a Representative Provider for its adversarial exposure validation (AEV) ...

Role of AI in Vulnerability Management

Vulnerability management is a continuous process of detecting, prioritizing, and addressing security weaknesses in software applications, networks, and systems. This proactive approach is vital for protecting an organization’s digital ...

Unstructured Data Management: Closing the Gap Between Risk and Response

Unstructured Data Management: Closing the Gap Between Risk and Response madhav Tue, 06/24/2025 - 05:44 The world is producing data at an exponential rate. With generative AI driving 90% of all newly created content, organizations are ...

Why work-life balance in cybersecurity must start with executive support

In this Help Net Security interview, Stacy Wallace, CISO at Arizona Department of Revenue, talks about the realities of work-life balance in cybersecurity leadership. She shares how her team handles constant pressure, sets boundaries, and deals ...

Reconmap: Open-source vulnerability assessment, pentesting management platform

Reconmap is an open source tool for vulnerability assessments and penetration testing. It helps security teams plan, carry out, and report on security tests from start to finish. The platform simplifies tasks and makes it easier for teams to work ...

Integrating SAST into Your CI/CD Pipeline: A Step-by-Step Guide

If you’re looking to supercharge your software delivery while keeping security tight, integrating Static Application Security Testing…Continue reading on Medium »

The real story behind cloud repatriation in 2025

In this Help Net Security video, Mark Wilson, Technology and Innovation Director at Node4, shares key insights from the company’s 2025 mid-market report. He explores the surprising trend of cloud repatriation, where 97% of mid-market ...

Cybersecurity jobs available right now: June 24, 2025

Cyber Security Analyst Ascendion | Singapore | On-site – View job details As a Cyber Security Analyst, you will lead incident response efforts, including forensic analysis, malware mitigation, and DoS attack resolution. Design and ...

How to effectively rotate secrets to improve security and efficiency

Manual secrets management creates security risks and operational challenges. Learn how automated rotation, centralized storage, and access controls improve security and keep workflows streamlined. The post How to effectively rotate secrets to ...

Bulletproof Security Workflows with Grip’s Jira Integration

See how Grip’s Jira integration automates SaaS security workflows, removes manual gaps, streamlines follow-up, and helps teams stay efficient and ahead of risk. The post Bulletproof Security Workflows with Grip’s Jira Integration appeared ...

Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation

Following last week’s U.S. airstrikes targeting Iranian nuclear sites, cybersecurity experts and government officials are now warning of a possible digital retaliation, a surge in cyber threats originating from Iran. On June 22, the ...

6 Most Mind-Bending Hacks From Past Black Hat Conferences

Six legendary Black Hat hacks, from ATM jackpotting to Tesla takeovers, and how they forced entire industries to rethink security protocols. The post 6 Most Mind-Bending Hacks From Past Black Hat Conferences appeared first on D3 Security. The ...

OpenAI Used Globally for Attacks – FireTail Blog

Jun 23, 2025 - - In 2025, virtually no one is a stranger to OpenAI’s ChatGPT. It is one of the most popular AI applications on the Internet, and almost everyone is using it from your boss, to your neighbor, to the passive-aggressive friend ...