Application Security News and Articles


SAP Zero-Day Targeted Since January, Many Sectors Impacted 

Hundreds of SAP NetWeaver instances hacked via a zero-day that allows remote code execution, not only arbitrary file uploads, as initially believed. The post SAP Zero-Day Targeted Since January, Many Sectors Impacted  appeared first on SecurityWeek.

Company and Personal Data Compromised in Recent Insight Partners Hack 

VC firm Insight Partners is informing partners and employees that their information was exposed in the January 2025 cyberattack. The post Company and Personal Data Compromised in Recent Insight Partners Hack  appeared first on SecurityWeek.

What your browser knows about you, from contacts to card numbers

Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the most data. Chrome: the most data-hungry browser (Source: Surfshark) The most data-hungry ...

Recipient Address Rejected: Access Denied – Causes & Fixes (SMTP 550 5.7.1)

Struggling with "recipient address rejected: access denied"? Understand SMTP 550 5.7.1 errors and how to fix this email bounce issue step by step. The post Recipient Address Rejected: Access Denied – Causes & Fixes (SMTP 550 5.7.1) appeared ...

Valuable Information Leaked in LockBit Ransomware Hack 

Private messages, Bitcoin addresses, victim data, and attacker information were leaked after someone hacked a LockBit admin panel. The post Valuable Information Leaked in LockBit Ransomware Hack  appeared first on SecurityWeek.

Living Off the Land (LOTL) Attacks: How your tools are used against you?

Introduction A well-known organisation called SolarWinds was attacked in September 2019. In this attack, a hacker used a supply chain attack to inject malicious code into the system. More than 18,000 SolarWinds customers installed Updates ...

VicOne xAurient accelerates threat response for automakers

VicOne announced xAurient, a new automotive threat intelligence platform that enables streamlined threat response by delivering early threat intelligence tailored to the particular manufacturing environment of an original equipment manufacturer ...

Elastic Kibana Prototype Contamination Leads to Arbitrary Code Execution Vulnerability (CVE-2025-25014)

Overview Recently, NSFOCUS CERT detected that Elastic issued a security bulletin to fix the arbitrary code execution vulnerability caused by Elastic Kibana prototype contamination (CVE-2025-25014); Due to the prototype contamination problem in ...

Coro SAT module defends against phishing attacks

Coro unveiled its Security Awareness Training (SAT) module. A purpose-built solution, SAT helps SMBs reduce human error, defend against phishing attacks, and demonstrate compliance without adding new tools to manage. As part of Coro’s modular ...

BigID Privacy Executive Console delivers proactive risk intelligence

BigID announced Privacy Executive Console, a transformative capability within the BigID Next platform designed to empower privacy leaders with a centralized, up-to-date view of their privacy program’s performance, risk posture, and ...

May 2025 Patch Tuesday forecast: Panic, change, and hope

April was an event-filled month for cybersecurity. Patch Tuesday came to us quickly on April 8 – the earliest first Tuesday possible in a given month. We again saw large numbers of CVEs addressed with 84 in Windows 11 and 87 in Windows 10 and ...

Review: AI Agents in Action

If you’re trying to make sense of how to actually build AI agents, not just talk about them, AI Agents in Action might be for you. About the author Michael Lanham, Lead AI Developer at Brilliant Harvest, is a seasoned software and ...

Analyze resource-based policy dependencies across your AWS Organizations accounts

Managing multiple AWS accounts in an organization can get complicated, especially when trying to understand how services and permissions are connected. The Account Assessment for AWS Organizations open-source tool helps simplify this process by ...

Wi-Fi 7 trials show big performance gains for enterprise networks

The next generation of wireless technology is getting a real-world test, and the results are promising. Recent trials led by the Wireless Broadband Alliance (WBA), in partnership with AT&T, Intel, and CommScope, show that Wi-Fi 7 delivers a ...

New infosec products of the week: May 9, 2025

Here’s a look at the most interesting products from the past week, featuring releases from ProcessUnity, Searchlight Cyber, ServiceNow, and Verosint. ServiceNow unveils AI agents to accelerate enterprise self-defense The new AI agents, ...

Ensuring Certainty in NHIs’ Lifecycle Management

What Makes Effective NHIs and Secrets Lifecycle Management So Crucial? The importance of NHIs and Secrets Lifecycle Management in ensuring robust cybersecurity measures is becoming increasingly apparent. Why? It offers certainty and control over ...

Being Proactive with Your NHIDR Strategy

What Does A Proactive NHIDR Strategy Look Like? A proactive Non-Human Identity and Data Rights (NHIDR) strategy involves anticipating potential threats and challenges instead of waiting for them to occur. It covers facets like security, data ...

Unlock Capabilities with Advanced NHIs Management

Are You Fully Utilizing Advanced NHIs for Secure Management? Emerging from the cornerstones of technology and cybersecurity, Non-Human Identities Management (NHIs) is proving to be a game-changer. This advanced security framework centers around ...

How Managed Kubernetes-as-a-Service Unlocks Immediate Value

In this digital-first world, organizations are constantly under pressure to deliver software and services faster, more reliably, and at greater scale. Platform teams, often small but tasked with supporting dozens or even hundreds of engineers, ...

An open letter to FireTail customers about security and data privacy – FireTail Blog

May 08, 2025 - Lina Romero - In the current landscape, we are seeing an upward trend of attacks, and this is only continuing to rise. The way we’ve been approaching applications needs to change drastically to address the growing risk vectors. ...