Application Security News and Articles


Why Securing NHIs Reduces Your Cyber Risk

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk ...

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead The rules of cybersecurity are shifting—again. As 2025 unfolds, companies face a paradox: digital acceleration ...

LLM04: Data & Model Poisoning – FireTail Blog

Jun 06, 2025 - Lina Romero - LLM04: Data & Model Poisoning Excerpt: In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is #4 on the list: Data ...

Avoid FedRAMP Delays: 7 Common SSP Mistakes to Fix

Seeking a FedRAMP authority to operate is a critical part of any cloud service looking to work with the government in an official capacity. It’s required if you are going to handle controlled unclassified information on behalf of the government ...

8 Challenges Data Center Managers Must Overcome in 2025

Modern data centers stand at the heart of global business and digital innovation. But behind every rack and server, data center managers must juggle rapid advances in technology, mounting regulatory pressure, and relentless demands for efficiency ...

They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home

When the Beatles sang the famous lyric “She came in through the bathroom window,” they were riffing on a real event, a fan who bypassed the front door and broke into Paul McCartney’s home. It was a metaphor for intrusion from the ...

Report on the Malicious Uses of AI

OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity ...

In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA

Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office. The post In Other News: FBI Warns of BadBox 2, NSO ...

AI and Wearable Health Tech: Real-Time Insights for Preventive Care

What if your smartwatch could spot a heart condition before your doctor did? That’s not science fiction, it’s today’s reality. Powered by artificial intelligence, wearable...Read More The post AI and Wearable Health Tech: Real-Time Insights ...

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25

Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple  names for the same threat actors. But what matters most is who did it (if we know), what they accessed and ...

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the ...

OAuth Tokens: The Danger Behind the Commvault Breach

Discover what went wrong in the Commvault breach: How AppOmni’s powerful SaaS security platform steps in to stop threats before they strike. The post OAuth Tokens: The Danger Behind the Commvault Breach appeared first on AppOmni. The post OAuth ...

Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?

Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0 botnet, the FBI has warned. Cyber criminals are using the botnet to perform ad fraud and click fraud. Access ...

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025

The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025. The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.

MIND Raises $30 Million for Data Loss Prevention

Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams. The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.

How Mature Is Your PKI? Find Out the Smart Way with the PKI Maturity Model

Assess. Improve. Future-Proof Your PKI Strategy The Need to Give Legacy PKI a Serious Makeover From securing communications and authenticating users to ensuring data integrity, Public key infrastructure (PKI) plays a vital role in keeping ...

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine. The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared ...

3 Reasons to Visit IRONSCALES at Pax8 Beyond 2025

Pax8 Beyond is far from your average MSP conference. It’s the premier event for MSP professionals who want to learn, collaborate, and walk away with actionable insights to grow their business. From hands-on tech labs to game-changing breakout ...

145 criminal domains linked to BidenCash Marketplace seized

Approximately 145 darknet and conventional internet domains, along with cryptocurrency funds linked to the BidenCash marketplace, have been seized by the U.S. Attorney’s Office for the Eastern District of Virginia. The operators of the ...

Cisco Patches Critical ISE Vulnerability With Public PoC

Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE). The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.