Application Security News and Articles


Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks

Leading to remote code execution and privilege escalation, the flaws were exploited on Cisco ASA 5500-X series devices that lack secure boot. The post Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks appeared first on ...

10 Common Network Vulnerabilities That Could Put Your Business At Risk

Network security has become a top priority for modern businesses, particularly those entrusted with sensitive financial and personal data. Moreover, Gartner projects a 15% increase in global cybersecurity spending, with a significant focus on ...

Shai‑Hulud NPM Supply Chain Attack 2025

On September 14, the JavaScript ecosystem was rocked by a massive npm 2.0 supply-chain attack. Security researchers are calling it one of…Continue reading on Medium »

Move AI Code Reviews from Korbit to CodeAnt.ai Today [Free]

Korbit AI has officially announced it is shutting down operations. The news comes as a surprise to many engineering teams who relied on…Continue reading on Medium »

Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls this growing black market the identity economy, where usernames, ...

Ransomware groups are multiplying, raising the stakes for defenders

Ransomware activity is climbing again, with a steep increase in the number of victims and the number of groups launching attacks. A new mid-year report from Searchlight Cyber shows how quickly the threat landscape is shifting and why CISOs need ...

Delinea releases free open-source MCP server to secure AI agents

AI agents are becoming more common in the workplace, but giving them access to sensitive systems can be risky. Credentials often get stored in plain text, added to prompts, or passed around without proper oversight. Delinea wants to fix that ...

How agentic AI is changing the SOC

In this Help Net Security video, David Norlin, CTO of Lumifi, explores the role of agentic AI in the security operations center (SOC). He explains what agentic AI is, how it can enhance cybersecurity workflows by automating repetitive tasks, and ...

Infosec products of the month: September 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Blackdot Solutions, Catchpoint, Cynomi, DataLocker, Gigamon, Lookout, Nagomi Security, Neon Cyber, QuSecure, Relyance AI, Secure ...

How to Enable MFA Before RDP and SSH Sessions

Remote access is essential for modern enterprises. IT administrators, DevOps teams, and vendors need to connect to critical infrastructure using Remote Desktop Protocol (RDP) or Secure Shell (SSH). But many organizations still allow these ...

The Complete Guide to B2B SaaS Top-of-Funnel Growth Strategies: AI-Powered Growth in 2025

Master B2B SaaS lead generation with proven top-of-funnel strategies. From Google Ads to content marketing, discover tools and tactics that successful companies use to fill their sales funnels with qualified prospects and drive sustainable ...

CVE-2025-20333, CVE-2025-20362: Frequently Asked Questions About Zero-Day Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) Vulnerabilities

Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign.  Update September 25: This FAQ blog has been ...

How to Manage Shadow AI Risk Without Killing Innovation

Shadow AI isn’t a fringe behavior; it’s the norm. My team recently analyzed AI usage patterns across multiple industries and found signs of unapproved AI activity in more than 80% of the 100+ customer organizations sampled. Whether it’s ...

Volvo Breach: A Closer Look at the Technical and Organizational Gaps

Volvo North America has confirmed a data breach affecting employee records, following a ransomware attack on its HR software provider, Miljödata. The breach did not originate within Volvo’s internal systems but through a third-party platform ...

Impenetrable Security Against NHI Threats

What Are Non-Human Identities (NHIs) and Why Are They Crucial in Today’s Cybersecurity Landscape? Where cyber threats loom larger than ever, does your organization recognize the pivotal role of Non-Human Identities? With technology continues to ...

How Do NHIs Keep Your Cloud Infrastructure Secure?

Are You Effectively Managing the Security of Your Non-Human Identities? For cybersecurity professionals, the management of Non-Human Identities (NHIs) has become a critical foundation for safeguarding cloud infrastructure. NHIs encompass machine ...

Smart Approaches to Secrets Vaults

How Do Non-Human Identities Shape Cybersecurity Protocols? Have you ever considered the pivotal role that non-human identities (NHIs) play in maintaining cybersecurity frameworks? In the digital landscape, human users are no longer the only ...

Independent Management of Cloud Secrets

Why is Independent Secrets Management Crucial for Cloud Security? Imagine your organization where each part must work harmoniously to thrive. Now, consider Non-Human Identities (NHIs) as the unsung workers that enable this city to function ...

Malicious MCP Server Found Quietly Stealing Emails

A popular MCP server in the NPM repository that was being downloaded 1,500 times a week suddenly began quietly copying emails and sending them to a C2 server after the developer inserted a line of code. Koi Security researchers said the incident ...

The Definitive Guide to Compliance Costs: Where Your Budget Goes

Key Takeaways Businesses are managing compliance on multiple fronts: cybersecurity standards, privacy regulations, third-party oversight, and sector-specific rules that change faster than budgets can adapt. Each requirement adds to the total cost ...