Application Security News and Articles


Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks

A Chinese threat actor exploited a zero-day vulnerability in Trimble Cityworks to hack local government entities in the US. The post Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks appeared first on SecurityWeek.

DMARC MSP Case Study: ImpactQuill Enhances Email Security and Visibility for Clients with PowerDMARC

Discover how ImpactQuill launched IQDMARC using PowerDMARC’s white label solution to enhance email security, and boost deliverability for clients. The post DMARC MSP Case Study: ImpactQuill Enhances Email Security and Visibility for Clients ...

DanaBot Botnet Disrupted, 16 Suspects Charged

The DanaBot botnet ensnared over 300,000 devices and caused more than $50 million in damages before being disrupted. The post DanaBot Botnet Disrupted, 16 Suspects Charged appeared first on SecurityWeek.

Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors

A Chinese espionage group has been chaining two recent Ivanti EPMM vulnerabilities in attacks against organizations in multiple critical sectors. The post Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors appeared first on ...

Token Security unveils MCP Server for non-human identity security

Token Security launched Model Context Protocol (MCP) Server for non-human identity (NHI). This capability brings the power of agentic AI to modern security operations and enables teams to interact with complex NHI data using simple, natural ...

Detect Vulnerabilities Faster With Website Scanner

As digital transformation becomes a strategic imperative, development teams have emerged as a pillar of organizations. Agile and DevOps practices have revolutionized the pace of innovation, enabling businesses to respond rapidly to evolving ...

Is privacy becoming a luxury? A candid look at consumer data use

In this Help Net Security interview, Dr. Joy Wu, Assistant Professor, UBC Sauder School of Business, discusses the psychological and societal impacts of data monetization, why current privacy disclosures often fall short, and what it will take to ...

Outsourcing cybersecurity: How SMBs can make smart moves

Outsourcing cybersecurity can be a practical and affordable option. It allows small businesses to get the protection they need without straining their budgets, freeing up time and resources to focus on core operations. 76% of SMBs lack the ...

Digital trust is cracking under the pressure of deepfakes, cybercrime

69% of global respondents to a Jumio survey say AI-powered fraud now poses a greater threat to personal security than traditional forms of identity theft. This number rises to 74% in Singapore, with 71% also indicating that AI-generated scams are ...

Shift left strategy creates heavy burden for developers

While 47% of organizations claim to have implemented shift left security strategies, many still struggle with execution gaps and security inefficiencies, according to Pynt. Of those who haven’t implemented shift left, half of them have no ...

New infosec products of the week: May 23, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Anchore, Cyble, Outpost24, and ThreatMark. Outpost24 simplifies threat analysis with AI-enhanced summaries Outpost24 announced the addition of ...

A Hyperscaler for Cybersecurity

Hyperscalers like AWS and GCP have transformed IT and general tech. Now it's time for the cybersecurity industry to catch up by shifting to specialized hyperscaler platforms built for security operations (SecOps) at scale. Why the cybersecurity ...

Why continuous discovery is critical to closing security gaps

Ask me how many applications are running in a typical enterprise cloud environment, and I’ll give you an estimate. Ask me again a few minutes later, and I might give you a completely different number. It’s not that I’m unsure on purpose — ...

Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection

The post Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection appeared first on Votiro. The post Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection appeared first on Security Boulevard.

News Alert: Halo Security reaches SOC 2 milestone, validating its security controls and practices

Miami, Fla., May 22, 2025, CyberNewsWire — Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by ...

Optimistic Security: A New Era for Cyber Defense

Why Optimistic Cybersecurity? Ever wondered how evolving technology could help fortify your entity against cyber threats? Well, this might be the perfect time to introduce the concept of Optimistic Cybersecurity, an innovative approach that’s ...

News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia

Cary, NC. May 22, 2025, CyberNewswire — INE Security, a global leader in Cybersecurity training and certifications, has announced a strategic partnership with Abadnet Institute for Training, a Riyadh-based leader in specialized Information ...

Model Context Protocol Decoded: What it is and How to Use it

The post Model Context Protocol Decoded: What it is and How to Use it appeared first on AI Security Automation. The post Model Context Protocol Decoded: What it is and How to Use it appeared first on Security Boulevard.

Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

AttackIQ has updated an existing assessment template in response to the CISA Advisory (AA25-141B) published on May 21, 2025, which disseminates Tactics, Techniques and Procedures (TTPs) and Indicators of Compromise (IOCs), associated with threat ...

Operation Endgame 2.0: DanaBusted

IntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort to dismantle and prosecute cybercriminal ...