Application Security News and Articles


SAP Patches Critical NetWeaver Vulnerabilities

The critical-severity NetWeaver flaws could be exploited for remote code execution and privilege escalation. The post SAP Patches Critical NetWeaver Vulnerabilities appeared first on SecurityWeek.

Vanta embeds agentic AI into policy and evidence workflows

Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, ...

Integrating Password Breach Monitoring

A Low-Lift, High-Impact Win for Cybersecurity Product Managers Every breach story seems to follow a pattern: attackers get hold of stolen credentials and use them to walk straight into systems. It’s not a zero-day exploit or a highly ...

Hummingbird’s compliance and risk platform helps financial institutions manage risk

Hummingbird announced its unified platform for risk and compliance operations. The expanded platform brings together the full risk and compliance lifecycle with the launch of new solutions for both Transaction & Risk Monitoring and Customer ...

Ransomware Losses Climb as AI Pushes Phishing to New Heights

Based on real-world insurance claims, Resilience’s midyear report shows vendor risk is declining but costly, ransomware is evolving with triple extortion, and social engineering attacks are accelerating through AI. The post Ransomware Losses ...

Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation

Attaullah Baig has filed a lawsuit against Meta and its executives, accusing them of retaliation over critical cybersecurity failures. The post Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation appeared first on SecurityWeek.

Cisco puts agentic AI at the core of Splunk Enterprise Security

Cisco introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and ...

Link11 Reports 225% more DDoS attacks in H1 2025 with new tactics against infrastructure

Frankfurt am Main, Germany, 9th September 2025, CyberNewsWire The post Link11 Reports 225% more DDoS attacks in H1 2025 with new tactics against infrastructure appeared first on Security Boulevard.

Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk

A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management ...

Fake npm 2FA reset email led to compromise of popular code packages

Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account. “The packages were updated to contain a piece of code that would be ...

NetApp StorageGRID 12.0 powers AI and data-intensive workloads

NetApp has released NetApp StorageGRID 12.0, a scalable, software-defined object storage solution designed for unstructured data. This latest version of StorageGRID introduces new capabilities designed to enhance AI initiatives, improve data ...

Top 5 Alternatives to Akamai Identity Cloud (And Why MojoAuth is #1)

Explore the top Akamai Identity Cloud alternatives. Learn why MojoAuth is the #1 CIAM solution for secure, scalable, and cost-effective migration. The post Top 5 Alternatives to Akamai Identity Cloud (And Why MojoAuth is #1) appeared first on ...

How One Phishing Email Compromised 18 npm Packages and Billions of Installs

On September 8, 2025, a single phishing email triggered one of npm’s most damaging supply chain attacks, compromising 18 popular JavaScript packages with over 2.6 billion weekly downloads. By tricking a maintainer into revealing credentials and ...

Report: Massive Number of Internet Exposed Assets Still Lack WAF Protection

Over half of internet-exposed cloud and non-cloud assets in Global 2000 companies lack web application firewall (WAF) protection, leaving sensitive data vulnerable amid rising cybersecurity threats and AI-driven attacks, according to a CyCognito ...

Download: Cyber defense guide for the financial sector

Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization’s cybersecurity, you must contend with evolving regulatory obligations, outdated IT ...

160,000 Impacted by Wayne Memorial Hospital Data Breach

In May 2024, hackers stole names, Social Security numbers, financial information, and protected health information from the hospital’s systems. The post 160,000 Impacted by Wayne Memorial Hospital Data Breach appeared first on SecurityWeek.

Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations

The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools. The post Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations appeared first on SecurityWeek.

Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion

The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek.

Silobreaker Requirements enables teams to improve threat intelligence

Silobreaker has launched Requirements, a new way for threat intelligence (TI) teams to define, operationalize and measure Priority Intelligence Requirements (PIRs). The new capability combines a PIR library with integrated monitoring tools and ...

Plex Urges Password Resets Following Data Breach

Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database. The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek.