Application Security News and Articles


IONIX Unveils Parked Domain Classification 

IONIX is proud to announce the launch of our new Parked Domain Classification capability within our Exposure Management platform. This feature enables security teams to intelligently categorize and monitor parked domains as distinct assets, ...

BSidesLV24 – Keynotes – Day One: “Secure AI” Is 20 Years Old

Authors/Presenters: Sven Cattell Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Beyond Visibility: CimTrak & Zscaler’s Integrated Approach to Zero Trust

Join Cimcor and Zscaler to learn how to strengthen threat detection, secure access, and maintain compliance by combining real-time integrity monitoring with cloud-native security solutions. Explore practical use cases and see a live demo ...

You Feel Like an Imposter and That’s Okay: Here’s How to Build Up Confidence

Cybersecurity imposter syndrome is practically universal among leaders. Learn how deliberate failure builds genuine confidence no certification provides. The post You Feel Like an Imposter and That’s Okay: Here’s How to Build Up ...

Transforming Your MSP: The Journey to Security-Driven Growth with Seceon

In today’s rapidly evolving digital landscape, MSPs face a critical inflection point. While traditional managed services remain foundational, the explosive growth in cybersecurity threats has created both urgent client needs and unprecedented ...

Navigating the Quantum Shift: A Practical Approach to Crypto-Agility with PQC-Enabled PKI

The conversation around quantum computing is shifting from theory to reality, especially when it’s centered on security and mounting threats against current encryption algorithms. The UK National Cyber Security Centre’s (NCSC) recent guidance ...

Building a reasonable cyber defense program

If you do business in the United States, especially across state lines, you probably know how difficult it is to comply with U.S. state data privacy laws. The federal government and many U.S. state governments require you to implement ...

ExaGrid announces three models and additional security features in software version update

ExaGrid announced three new models: the EX20, EX81, and EX135 to its line of Tiered Backup Storage appliances, as well as the release of ExaGrid software version 7.2.0. ExaGrid tiered backup storage appliance models ExaGrid’s line of 2U ...

Security Operations Firm ReliaQuest Raises $500M at $3.4B Valuation

ReliaQuest has announced a new growth funding round that brings the total raised by the firm to over $830 million. The post Security Operations Firm ReliaQuest Raises $500M at $3.4B Valuation appeared first on SecurityWeek.

Stellar Cyber Open Cybersecurity Alliance enhances threat detection and response

Stellar Cyber launched its Open Cybersecurity Alliance based on its award-winning Open XDR platform. This initiative streamlines security operations, improves interoperability, and enhances threat detection and response for enterprises and MSSPs. ...

Ransomware Group Takes Credit for National Presto Industries Attack

A ransomware group has claimed responsibility for a March cyberattack on National Presto Industries subsidiary National Defense Corporation. The post Ransomware Group Takes Credit for National Presto Industries Attack appeared first on SecurityWeek.

OpenSSF guidelines encourage OSS developers to build securely

Developers have always had a conflicted relationship with security. While they don't want to produce software with security flaws, they don't want to be security experts either. With that in mind, the Open Source Security Foundation (OpenSSF) has ...

Critical Vulnerability Found in Canon Printer Drivers

Microsoft’s offensive security team warned Canon about a critical code execution vulnerability in printer drivers.  The post Critical Vulnerability Found in Canon Printer Drivers appeared first on SecurityWeek.

Product Update: Automate alerts to your social media

Escape has created the first ever push-to-post automation to revolutionize vulnerability management by giving you the recognition you deserve. The post Product Update: Automate alerts to your social media appeared first on Security Boulevard.

Tax Season Threat Surge 

Veriti Research has identified a significant rise in tax-related malware samples across multiple platforms. The research team discovered malware samples targeting Android, Linux, and Windows, all connected to the same adversary operating from a ...

Attackers are probing Palo Alto Networks GlobalProtect portals

Cybersecurity company GreyNoise is warning about a significant increase of scanning activity targeting internet-facing Palo Alto Networks GlobalProtect portals in the last 30 days, and has urged organizations with exposed systems to secure them ...

CrushFTP Blames Security Firms for Fast Exploitation of Vulnerability

Shadowserver has started seeing exploitation attempts aimed at a CrushFTP vulnerability tracked as CVE-2025-2825 and CVE-2025-31161. The post CrushFTP Blames Security Firms for Fast Exploitation of Vulnerability appeared first on SecurityWeek.

LoftLabs vNode simplifies Kubernetes operations

LoftLabs launched vNode to redefine secure tenant isolation in Kubernetes. By introducing a new layer of virtualization on the node level, vNode ensures workloads remain fully isolated, allowing platform teams to enforce stricter security ...

Check Point Responds to Hacking Claims

Check Point has responded to a hacker’s claims of sensitive data theft, confirming an incident but saying that it had limited impact. The post Check Point Responds to Hacking Claims appeared first on SecurityWeek.

Apple Patches Recent Zero-Days in Older iPhones

Apple has released a hefty round of security updates for its desktop and mobile products, patching two recent zero-days in older iPhone models. The post Apple Patches Recent Zero-Days in Older iPhones appeared first on SecurityWeek.