Application Security News and Articles


Why Threat Agents Must be Included in Cybersecurity Risk Assessments

In the ever-evolving landscape of cybersecurity, organizations face a constant struggle: how to best allocate limited resources to maximize their defensive posture. No one has enough budget, personnel, or tools to defend against every conceivable ...

AI Ready: The Complete Guide to AI-Powered Cybersecurity Training in 2025/2026

Introduction: The AI Cybersecurity Crisis The cybersecurity landscape has fundamentally changed. AI-powered cyberattacks are projected to surge by 50% in 2024 compared to 2021, with Gartner research showing a 63% increase since 2023. Meanwhile, ...

Why Users Are Satisfied with Secure NHIs

Is Securing Non-Human Identities (NHIs) the Key to User Satisfaction? I can attest to the increasing importance of NHIs. Machine identities, as they’re often referred to, are integral to the security of organizations operating. But how does ...

Capabilities Unlocked by Advanced NHI Management

How Can NHI Management Unlock Advanced Security Capabilities? Ever considered the security measures that stand behind extensive data networks? A key component of this invisible fortress is the Non-Human Identity (NHI) which, armed with its own ...

Innovative Approaches to NHI Protection

Will Rising Cybercrimes Warrant a More Innovative Approach to NHI Protection? With the intensifying wave of cybercrimes, robust and innovative strategies are crucial in tackling these emerging threats. One area that is often overlooked yet holds ...

5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them

4 min readDiscover the emerging class of attacks involving software workloads and AI agents. The post 5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them appeared first on Aembit. The post 5 Common Ways Non-Human ...

OffensiveCon25 – Breaking The Sound Barrier: Exploiting CoreAudio Via Mach Message Fuzzing

Author/Presenter: Dillon Franke Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Patch Tuesday: Adobe documents hundreds of bugs across multiple products and warns of code execution, feature bypass risks. The post Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce appeared first on SecurityWeek.

How to Overcome Modern Colocation Challenges with DCIM Software

Effective digital infrastructure management remains crucial as colocation data centers grow more intricate and essential in supporting global digital operations. Modern Data Center Infrastructure Management (DCIM) platforms, such as Hyperview, ...

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Redmond warns that external control of a file name or path in WebDAV "allows an unauthorized attacker to execute code over a network." The post Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ appeared first on ...

Android Enterprise update puts mobile security first

Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over ...

Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053)

9Critical 56Important 0Moderate 0Low Microsoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild. Microsoft addresses 65 CVEs in its June 2025 Patch Tuesday release, with nine rated critical, and 56 ...

Randall Munroe’s XKCD ‘Trojan Horse’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Trojan Horse’ appeared first on Security Boulevard.

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

UNFInished business: We were warned this would happen. And now here we are. The post Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard.

OffensiveCon25 – Android In-The-Wild: Unexpectedly Excavating A Kernel Exploit

Author/Presenter: Seth Jenkins Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Double Dash, Double Trouble: A Subtle SQL Injection Flaw

Can a simple dash character introduce a security risk? Discover how SQL line comments can open the door to unexpected injection vulnerabilities in several PostgreSQL client libraries! The post Double Dash, Double Trouble: A Subtle SQL Injection ...

Industrial Cybersecurity 2025: Key Takeaways from our Webinar

In a timely and candid webinar hosted by Axio, leading experts discussed what’s working (and what’s not) in industrial cybersecurity as we look toward 2025. Featuring insights from cybersecurity veteran Read More The post Industrial ...

Unlock the Power of Plixer One: AI-Driven Network Data Analysis

Plixer is live from Cisco Live 2025 at the San Diego Convention Center, and they’re ready to showcase the future of AI-driven network visibility. Join Peter Silva as he catches up with Nils Werner for a behind-the-scenes look at what attendees ...

Marks & Spencer Suffers Ransomware Attack by Scattered Spider Group

Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the ransomware attack that recently hit Marks & Spencer.  The post Marks & Spencer Suffers ...

ArmorCode provides enterprises with contextual understanding of their code repositories

ArmorCode launched AI Code Insights, a new set of capabilities that leverages ArmorCode’s agentic AI, Anya, to provide enterprises with contextual understanding of their code repositories, empowering security and development teams to secure ...