Application Security News and Articles


CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets

The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them to verify/connect their crypto wallets. The CoinMarketCap compromise CoinMarketCap (aka CMC) is a ...

The Interoperability Crisis in HealthTech: Can AI Help Connect the Dots?

Clinicians waste ~12 hours/week battling fragmented data. That’s not a tech debt, it’s a human one. While patients wait, doctors dig through disconnected systems, re-order...Read More The post The Interoperability Crisis in HealthTech: Can AI ...

Iran Cyber Threat Assessment and Defensive Guidance

As hostilities between Israel and Iran resumed earlier this month, sources warned of cyber activity stemming from the conflict. Recent escalation has likely raised additional concerns (or at least questions) about what threats exist, how likely ...

How Exposure Management Helps Communicate Cyber Risk

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, Tenable experts discuss best practices for communicating cyber ...

Okta Introduces Cross App Access to Secure AI Agents in Enterprise

Okta Inc. on Monday said it has created a new protocol to secure artificial intelligence (AI) agents to bring visibility, control and governance to agent-driven and app-to-app interactions. The Cross App Access platform is especially important as ...

A Multimillion-Dollar Risk: How CEOs Can Better Assess Cybersecurity Threats

Every CEO and CFO understands how to quantify operational risk. Market volatility, supply chain disruptions, and regulatory compliance are all baked into financial projections and boardroom discussions. Yet, when it comes to cyber risk, most ...

Critical Authentication Bypass Flaw Patched in Teleport

A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems. The post Critical Authentication Bypass Flaw Patched in Teleport appeared first on SecurityWeek.

743,000 Impacted by McLaren Health Care Data Breach

The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care. The post 743,000 Impacted by McLaren Health Care Data Breach appeared first on SecurityWeek.

Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)

Citrix has fixed a critical vulnerability (CVE-2025-5777) in NetScaler ADC and NetScaler Gateway reminiscent of the infamous and widely exploited CitrixBleed flaw. The vulnerabilities have been privately disclosed and there is no indication that ...

US Braces for Cyberattacks After Joining Israel-Iran War

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites. The post US Braces for Cyberattacks After Joining Israel-Iran War appeared first on SecurityWeek.

Closing the Gap Between AI Ambition and Enterprise Reality 

Even when infrastructure improves, enterprises still face a fundamental hurdle: AI systems don’t behave like traditional software. The post Closing the Gap Between AI Ambition and Enterprise Reality  appeared first on Security Boulevard.

Stop Blaming CVSS: The Real Problem in Vulnerability Management is Us 

CVSS is not the enemy, so the sooner we stop blaming the tool and start fixing the system around it, the better off we’ll all be.  The post Stop Blaming CVSS: The Real Problem in Vulnerability Management is Us  appeared first on Security ...

Securing ACH Against Emerging Authentication Bypass Methods 

Anyone accepting or sending ACH payments should understand common fraud techniques and take appropriate measures to curb them. The post Securing ACH Against Emerging Authentication Bypass Methods  appeared first on Security Boulevard.

Steelmaker Nucor Says Hackers Stole Data in Recent Attack

Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems. The post Steelmaker Nucor Says Hackers Stole Data in Recent Attack appeared first on SecurityWeek.

SAST 是什麼?

SAST,靜態應用程式安全測試(Static Application Security ...

Stealthy backdoor found hiding in SOHO devices running Linux

SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The threat is part of a broader shift in how China-Nexus threat actors are using Operational Relay Box ...

WormGPT Variants Powered by Grok and Mixtral Have Emerged 

Cato CTRL has discovered previously unreported WormGPT variants, but with a twist — they are powered by xAI’s Grok and Mistral AI’s Mixtral.    The post WormGPT Variants Powered by Grok and Mixtral Have Emerged  appeared first on ...

How CISOs can justify security investments in financial terms

In this Help Net Security interview, John Verry, Managing Director at CBIZ, discusses how insurers and financial risk professionals evaluate cybersecurity maturity through different lenses. He also shows how framing cyber risk in business terms ...

Review: Redefining Hacking

Redefining Hacking takes a look at how red teaming and bug bounty hunting are changing, especially now that AI is becoming a bigger part of the job. About the authors Omar Santos is a Distinguished Engineer at Cisco focusing on AI security, ...

Quantum risk is already changing cybersecurity

A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security teams need to stop treating it like a problem for tomorrow. The report, Approaching Quantum Dawn: Closing the Cybersecurity Readiness ...