Application Security News and Articles


HR’s 2025 Guide to Preventing Interview and Onboarding Fraud

A Wake-Up Call for HR in the Age of Deepfakes and Remote Work In 2025, HR leaders are facing a new kind of threat: highly convincing fake applicants, AI-powered resume fraud, and deepfake interview proxies. What used to be fringe or far-fetched ...

Zero-Click Flaw in Microsoft Copilot Illustrates AI Agent, RAG Risks

Aim Security researchers found a zero-click vulnerability in Microsoft 365 Copilot that could have been exploited to have AI tools like RAG and AI agents hand over sensitive corporate data to attackers simply by issuing a request for the ...

A Guide to Managed Kubernetes-as-a-Service Shared Responsibility Model

Kubernetes is powerful, but managing it in-house can be a major drain on your engineering resources. That’s why many organizations are turning to Fairwinds Managed Kubernetes-as-a-Service (KaaS): we handle the complexity, so you can focus on ...

LinuxFest Northwest: Easy Modular Sensors And Automation

Author/Presenter: Sam Groveman (Research Associate) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest ...

How identity management is shifting into the agent era

We’re witnessing a shift in enterprise architecture: AI agents are moving from supporting roles to autonomous actors that drive decisions, trigger transactions, and interact directly with APIs — often on behalf of users. As a result, identity ...

In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost

Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million.  The post In Other News: ...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Paris, France, 13th June 2025, CyberNewsWire The post Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale appeared first on Security Boulevard.

Identiverse 2025: Trust, Delegation, and the Era of Continuous Identity

Identiverse 2025 exposed the urgent need for NHI governance. From AI agents to orphaned credentials, NHIs and their sprawling secrets are today’s most overlooked risks. The post Identiverse 2025: Trust, Delegation, and the Era of Continuous ...

Third-Party Cyber Risk Management Platforms: The Definitive Guide

Introduction to Third-Party Cyber Risk Management Platforms Third-party cyber risk management (TPRM) represents the systematic approach organizations use to assess, monitor, and mitigate cybersecurity risks posed by external vendors, suppliers, ...

Cybersecurity Snapshot: NIST Offers Zero Trust Implementation Advice, While OpenAI Shares ChatGPT Misuse Incidents

Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about their exposure management experiences. And ...

Cybersecurity Insights with Contrast CISO David Lindner | 06/13/25

Insight No. 1 — The great CISO exodus: Why your top defenders are planning a silent escape What happens when your most critical security minds are quietly planning their exit? With 53% of cyber leaders exploring new roles, the cybersecurity ...

TeamFiltration Abused in Entra ID Account Takeover Campaign

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts. The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday. The ...

Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Industry professionals comment on the Trump administration’s new executive order on cybersecurity.  The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.

Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business Following the Latest Outage

Discover the capabilities of Microsoft 365 Data Loss Prevention (DLP) and understand its limitations. Learn how to prevent unauthorized data access and sharing. The post Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business ...

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers. The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.

Fog Ransomware Attack Employs Unusual Tools

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41. The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.

How to Reduce PR Merge Time from 14 Days to Under a Day? | Panto AI

Imagine engineers finishing a new feature, only to see it sit idle in a pull request (PR) queue for days or even weeks. This delay is not…Continue reading on Medium »

[Webinar] Securing AI-driven applications with DAST

Join us for a live webinar with application security experts and Escape clients - Seth Kirschner (DoubleVerify), Nathan Byrd (Applied Systems), Nick Semyonov (PandaDoc), as they break down how their teams are rethinking testing strategies to keep ...

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication. The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek.