Application Security News and Articles


AWS Makes Bevy of Updates to Simplify Cloud Security

Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a ...

Critical Vulnerability Patched in Citrix NetScaler

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows. The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek.

Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk

Sensitive data and secrets are leaking. How cloud security leaders can shut them down. Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials ...

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog. The post Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation appeared first on ...

TPSRM: What It Is — And Why It Matters

Third-party risk management TPRM is a well-established pillar of enterprise security programs. Its focus is on evaluating vendors for financial health, operational resilience, and compliance. As digital ecosystems expanded, so did the attack ...

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)

Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root access on most Linux distributions “with minimal effort.” About the ...

Jumio Liveness Premium combats deepfakes and injection attacks

Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s premium solution leverages a patented Jumio technology, combining randomized color ...

Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security

Adopting a layered defense strategy that includes human-centric tools and updating security components. The post Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security appeared first on SecurityWeek.

OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges. The post OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract appeared first on SecurityWeek.

AdaCore and CodeSecure Merge to Form a Global Company Providing Embedded Software Security and Safety Solutions

[New York, US, 06/18/25] AdaCore, which provides software development tools for mission-critical systems, and embedded software security company CodeSecure, today announced a definitive merger agreement. The merger creates a unified company ...

Chrome 137 Update Patches High-Severity Vulnerabilities

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek.

The Hidden Dangers of AI Copilots and How to Strengthen Security and Compliance 

Now is the time for IT leaders to enforce AI security policies and ensure that generative AI is leveraged safely and responsibly.  The post The Hidden Dangers of AI Copilots and How to Strengthen Security and Compliance  appeared first on ...

Why AI Agents are the Secret to a Proactive Cybersecurity Defense

To level the playing field, enterprise security teams must begin to use AI — especially AI agents — to augment their existing human talent. The post Why AI Agents are the Secret to a Proactive Cybersecurity Defense appeared first on ...

DMARC MSP Case Study: How Primary Tech Simplified Client Domain Security with PowerDMARC

UK-based MSP Primary Tech simplified domain security for multiple client domains by partnering with PowerDMARC. Read their full success story! The post DMARC MSP Case Study: How Primary Tech Simplified Client Domain Security with PowerDMARC ...

Can Deepfakes Fool Your HR or IT Teams? What Every Remote-First Company Must Know in 2025

In 2025, the person you just hired might not be a person at all. Sounds dramatic? It’s not. Deepfakes have officially entered the corporate chat...Read More The post Can Deepfakes Fool Your HR or IT Teams? What Every Remote-First Company Must ...

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution. The post Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products appeared first on SecurityWeek.

Out of Juice? TSA Says Don’t Plug Into Airport USB Ports 

Phone low on charge at the airport? Don't be tempted to use a public USB to recharge, according to the TSA - beware of "juice-jacking." The post Out of Juice? TSA Says Don’t Plug Into Airport USB Ports  appeared first on Security Boulevard.

Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource. The post Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People appeared first on SecurityWeek.

Boost Your Cyber Defense with NSFOCUS Integrated Threat Intelligence (NTI)

In today’s rapidly evolving cybersecurity landscape, staying ahead of threats is not just a challenge, it’s a necessity. At NSFOCUS, we are committed to providing users with the most advanced and comprehensive threat intelligence solutions to ...

Dashlane’s AI model alerts businesses to phishing risks

Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting user credentials. Trained by Dashlane on both legitimate and phishing sources, the new innovation ...