Application Security News and Articles


Adobe Patches Critical ColdFusion and Commerce Vulnerabilities

Adobe has patched nearly two dozen vulnerabilities across nine of its products with its September 2025 Patch Tuesday updates. The post Adobe Patches Critical ColdFusion and Commerce Vulnerabilities appeared first on SecurityWeek.

Analysis evidence from SonarQube now available in JFrog AppTrust

By integrating SonarQube's industry-leading automated code review with JFrog's new AppTrust governance platform, together we are providing the essential framework for software engineering teams to embrace AI-driven speed without compromising on ...

Analysis evidence from SonarQube now available in JFrog AppTrust

By integrating SonarQube's industry-leading automated code review with JFrog's new AppTrust governance platform, together we are providing the essential framework for software engineering teams to embrace AI-driven speed without compromising on ...

Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)

8Critical 72Important 0Moderate 0Low Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed. Microsoft addresses 80 CVEs in its September 2025 Patch Tuesday release, with eight rated critical, and 72 rated ...

News alert: Link11 tracks 225% surge in DDoS attacks, record-breaking scale and duration

Frankfurt, Sept. 9, 2025, CyberNewswire — The threat landscape surrounding distributed denial-of-service (DDoS) attacks intensified significantly in the first half of 2025, according to the latest Link11 European Cyber Report. Documented ...

Elevating Data Security in AI & Analytics Workloads: Thales & Databricks

Elevating Data Security in AI & Analytics Workloads: Thales & Databricks andrew.gertz@t… Tue, 09/09/2025 - 16:59 Data Security Aamir Sardar | Director Alliances, Thales CSP More About This Author > A ...

Burger King’s ‘Very Bad’ Bugs Leaked Your Data, Claim Gagged Hackers

Streisand Effect in full effect: Restaurant Brands International (RBI) “assistant” platform riddled with terrible security flaws. The post Burger King’s ‘Very Bad’ Bugs Leaked Your Data, Claim Gagged Hackers appeared first on Security ...

Plex tells users to change passwords due to data breach, pushes server owners to upgrade

Media streaming company Plex has suffered a data breach and is urging users to reset their account password and enable two-factor authentication. “An unauthorized third party accessed a limited subset of customer data from one of our ...

Inside Rail Europe’s Strategy to Stop Bots Before They Disrupt Business

Discover how Rail Europe blocks malicious traffic in real time—without latency or impact on user experience—using DataDome’s AI-powered Cyberfraud Protection Platform. The post Inside Rail Europe’s Strategy to Stop Bots Before They ...

BSidesSF 2025: Follow The Trace: How Traditional AppSec Tools Have Failed Us

Creator, Author and Presenter: Kennedy Toomey Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Kubernetes 1.34 Released: What’s New and When to Upgrade

Kubernetes 1.34 is now generally available, but most organizations aren't running it yet. No rush here, but it’s great to look ahead. The Kubernetes community and leading managed services, such as Google Kubernetes Engine (GKE), Amazon Elastic ...

Il 60% non colpisce nel segno. E tu?

Cosa rivela FireMon Insights sui rischi legati alle policy dei firewall e come porre rimedio La gestione del firewall è l’eroe silenzioso (o l’antagonista nascosto) della sicurezza di rete. Il... The post Il 60% non colpisce nel segno. E tu? ...

What Being a Customer Favorite in The Forrester Wave™: Static Application Security Testing Solutions, Q3 2025 Really Means

Mend.io is recognized as a Strong Performer and customer favorite in The Forrester Wave™: SAST Q3 2025. The post What Being a Customer Favorite in The Forrester Wave™: Static Application Security Testing Solutions, Q3 2025 Really Means ...

4 Ways CimTrak Helps Achieve DoD IL5 Authorization

As the Department of Defense (DoD) accelerates its Zero Trust journey, protecting sensitive mission-critical workloads is paramount. At the center of this push is Impact Level 5 (IL5) authorization, a crucial designation for cloud service ...

GPUGate Malware Shows Hardware-Specific Evasion Tactics: Arctic Wolf

Bad actors are using GitHub's repository structure and paid Google Ads placements to trick EU IT users into downloading a unique malware dubbed "GPUGate" that includes new hardware-specific evasion techniques that may begin to appear in other ...

Exposed Docker APIs Likely Exploited to Build Botnet

Hackers mount the host’s file system into fresh containers, fetch malicious scripts over the Tor network, and block access to the Docker API. The post Exposed Docker APIs Likely Exploited to Build Botnet appeared first on SecurityWeek.

Relyance AI Data Defense Engineer secures AI-driven data

Relyance AI has released Data Defense Engineer, an AI-native feature that works 24/7 to understand, monitor, and protect thousands of data journeys, learns from every interaction, and autonomously enforces policies at machine speed. As ...

SAP Patches Critical NetWeaver Vulnerabilities

The critical-severity NetWeaver flaws could be exploited for remote code execution and privilege escalation. The post SAP Patches Critical NetWeaver Vulnerabilities appeared first on SecurityWeek.

Vanta embeds agentic AI into policy and evidence workflows

Vanta has unveiled a new set of capabilities that integrates AI across core compliance and risk workflows. These features unify policy management with the Vanta AI Agent, expand first-party risk oversight and continuous monitoring for vendors, ...

Integrating Password Breach Monitoring

A Low-Lift, High-Impact Win for Cybersecurity Product Managers Every breach story seems to follow a pattern: attackers get hold of stolen credentials and use them to walk straight into systems. It’s not a zero-day exploit or a highly ...