Application Security News and Articles
A Wake-Up Call for HR in the Age of Deepfakes and Remote Work
In 2025, HR leaders are facing a new kind of threat: highly convincing fake applicants, AI-powered resume fraud, and deepfake interview proxies. What used to be fringe or far-fetched ...
Aim Security researchers found a zero-click vulnerability in Microsoft 365 Copilot that could have been exploited to have AI tools like RAG and AI agents hand over sensitive corporate data to attackers simply by issuing a request for the ...
Kubernetes is powerful, but managing it in-house can be a major drain on your engineering resources. That’s why many organizations are turning to Fairwinds Managed Kubernetes-as-a-Service (KaaS): we handle the complexity, so you can focus on ...
Author/Presenter: Sam Groveman (Research Associate)
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest ...
We’re witnessing a shift in enterprise architecture: AI agents are moving from supporting roles to autonomous actors that drive decisions, trigger transactions, and interact directly with APIs — often on behalf of users. As a result, identity ...
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million.
The post In Other News: ...
Paris, France, 13th June 2025, CyberNewsWire
The post Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale appeared first on Security Boulevard.
Identiverse 2025 exposed the urgent need for NHI governance. From AI agents to orphaned credentials, NHIs and their sprawling secrets are today’s most overlooked risks.
The post Identiverse 2025: Trust, Delegation, and the Era of Continuous ...
Introduction to Third-Party Cyber Risk Management Platforms
Third-party cyber risk management (TPRM) represents the systematic approach organizations use to assess, monitor, and mitigate cybersecurity risks posed by external vendors, suppliers, ...
Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about their exposure management experiences. And ...
Insight No. 1 — The great CISO exodus: Why your top defenders are planning a silent escape
What happens when your most critical security minds are quietly planning their exit? With 53% of cyber leaders exploring new roles, the cybersecurity ...
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.
A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s Graphite mercenary spyware, Citizen Lab researchers have revealed on Thursday. The ...
Industry professionals comment on the Trump administration’s new executive order on cybersecurity.
The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.
Discover the capabilities of Microsoft 365 Data Loss Prevention (DLP) and understand its limitations. Learn how to prevent unauthorized data access and sharing.
The post Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business ...
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.
Imagine engineers finishing a new feature, only to see it sit idle in a pull request (PR) queue for days or even weeks. This delay is not…Continue reading on Medium »
Join us for a live webinar with application security experts and Escape clients - Seth Kirschner (DoubleVerify), Nathan Byrd (Applied Systems), Nick Semyonov (PandaDoc), as they break down how their teams are rethinking testing strategies to keep ...
Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.
The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek.