Application Security News and Articles


Researchers expose large-scale YouTube malware distribution network

Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed the “YouTube Ghost Network.” The network published more than 3,000 videos across ...

Escaping Secrets Hell: How Workload Identity Scales Where Secrets Can’t

Organizations rushing to deploy AI agents and scale cloud native infrastructures are hitting an unexpected bottleneck: the complexity of securing machine-to-machine communications. Just 18 months ago, there were 45 machine identities for each ...

Wireshark 4.6.0 brings major updates for packet analysis and decryption

If you’ve ever used Wireshark to dig into network traffic you know how vital even small upgrades can be. With version 4.6.0 the team behind the open-source network protocol analyzer has added a number of features that could change how you ...

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)

CVE-2025-61932, an “improper verification of source of a communication channel” vulnerability affecting Lanscope Endpoint Manager, has been exploited as a zero-day since April 2025, the Japan Computer Emergency Response Team ...

AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk

SquareX has shown how malicious browser extensions can impersonate AI sidebar interfaces. The post AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk appeared first on SecurityWeek.

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

Palo Alto, California, 23rd October 2025, CyberNewsWire The post AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars appeared first on Security Boulevard.

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments

NETSCOUT announced an innovation designed to meet organizations’ needs for observability within complex cloud environments. With the demands of large, multi-cluster Kubernetes deployments, organizations often face challenges related to ...

House Democrats Push Back at Reassignments, Firings of CISA Employees

Democrats in Congress are continuing to target the Trump Administrations actions with CISA, with the latest effort being a letter from House Democrats arguing the firing some employees and moving others to help with the president's expansive ...

The True Cost of Not Having a Cloud Repository

For many organizations, on-premises artifact repositories have long been "good enough." They are familiar. They work. They seem cheaper on paper. The post The True Cost of Not Having a Cloud Repository appeared first on Security Boulevard.

Anchore Enterprise 5.22: OpenVEX, PURLs, and RHEL EUS Support

Anchore Enterprise 5.22 introduces three capabilities designed to make vulnerability management clearer, cleaner, and more trustworthy:  Each of these features adds context and precision to vulnerability data—helping teams reduce noise, speed ...

Building Confidence Through Traceability: Lessons From Mail and Tech

Learn how traceability builds customer trust through certified mail tracking and modern authentication. Boost reliability online and offline in 2025. The post Building Confidence Through Traceability: Lessons From Mail and Tech appeared first on ...

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned. The company blocked over 250 exploitation attempts targeting multiple stores on Wednesday, ...

Vibe Coding’s Real Problem Isn’t Bugs—It’s Judgment

As AI coding tools flood enterprises with functional but flawed software, researchers urge embedding security checks directly into the AI workflow. The post Vibe Coding’s Real Problem Isn’t Bugs—It’s Judgment appeared first on SecurityWeek.

Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk

Patched in September, the SessionReaper bug could be exploited without authentication to bypass a security feature. The post Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk appeared first on SecurityWeek.

BIND Updates Address High-Severity Cache Poisoning Flaws

The vulnerabilities allow attackers to predict source ports and query IDs BIND will use, and to inject forged records into the cache. The post BIND Updates Address High-Severity Cache Poisoning Flaws appeared first on SecurityWeek.

AI Application Vulnerability Remediation: Why AI Vulnerability Fixes Fail Without Runtime Context

TL;DR AI-powered vulnerability remediation often fails because it lacks context about how your applications actually work. Runtime intelligence solves this by providing AI with real-world application behavior data, architecture insights, and ...

Lanscope Endpoint Manager Zero-Day Exploited in the Wild

The bug has been exploited in the wild as a zero-day and the US cybersecurity agency CISA has added it to its KEV catalog. The post Lanscope Endpoint Manager Zero-Day Exploited in the Wild appeared first on SecurityWeek.

Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm

Verizon’s 2025 Mobile Security Index shows that 85% of organizations believe mobile device attacks are on the rise. The post Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm appeared first on SecurityWeek.

AuditBoard expands AI compliance with FairNow acquisition and Accelerate launch

AuditBoard has reached a definitive agreement to acquire FairNow. The addition of FairNow enhances AuditBoard’s capabilities with intelligent, automated, step-by-step AI compliance guidance. As AI governance requirements expand globally, ...

The Human Cost of Defense: A CISO’s View From the War Room

Semperis’ Midnight in the War Room reveals the unseen struggles, burnout and heroism of CISOs and defenders who protect our digital world every day. The post The Human Cost of Defense: A CISO’s View From the War Room appeared first on ...