Application Security News and Articles


Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks

Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware. The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared ...

Microsoft and IRONSCALES Crack Down on the Direct Send Exploit

Back in Part 1, we walked through how attackers are using Microsoft 365’s Direct Send feature to spoof internal emails, making those messages look like they’re coming from a trusted domain. The post Microsoft and IRONSCALES Crack Down on the ...

Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms

A recently uncovered phishing campaign – carefully designed to bypass security defenses and avoid detection by its intended victims – is targeting firms in industrial manufacturing and other companies critical to various supply ...

PortSwigger Lab : Unprotected Admin Functionality with Unpredictable URL

This lab highlights how sensitive paths hidden in source code can lead directly to admin functionality — and without proper access control…Continue reading on System Weakness »

PortSwigger Lab : Unprotected Admin Functionality with Unpredictable URL

This lab highlights how sensitive paths hidden in source code can lead directly to admin functionality — and without proper access control…Continue reading on Medium »

Halo Security platform updates give teams better control over exposure data

Halo Security announced platform enhancements designed to give security teams flexibility and control within the platform. The new features include custom dashboards, configurable reports, and improved automation capabilities that give ...

Generative AI: Boon or Bane? Unveiling Security Risks & Possibilities

Unleash the potential of Generative AI! Explore its groundbreaking applications and discover how to navigate the emerging security risks. This blog dives into t The post Generative AI: Boon or Bane? Unveiling Security Risks & Possibilities ...

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an answer. In a new paper, academics from Inria and the CISPA Helmholtz Center for Information ...

Help Wanted: Dark Web Job Recruitment is Up

Cybercriminal forums are experiencing a recruitment boom, with dark-web job postings for hackers, AI experts, and social engineers doubling year over year. Research from Reliaquest highlights growing demand for English-speaking social ...

Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are ...

Organized and Criminal, Ransomware Gangs Run Up Profits 

Ransomware attacks are rising 49% as cyber gangs evolve into organized criminal enterprises. With over 200 groups operating like corporations — recruiting talent, using RaaS models, and deploying multi-extortion tactics — defenders must ...

AI isn’t taking over the world, but here’s what you should worry about

In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work, why they can’t become sentient, ...

AI can’t deliver without trusted, well-governed information

While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey ...

Infosec products of the month: August 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Black Kite, Brivo, Cloudflare, Descope, Doppel, Druva, Elastic, ExtraHop, LastPass, Prove, Riverbed, Rubrik, StackHawk, and Trellix. StackHawk empowers ...

News alert: Halo Security’s custom dashboards give security teams control while streamlining workflows

Miami, Aug. 28, 2025, CyberNewswire — Halo Security, a leading provider of external risk management solutions, today announced significant platform enhancements designed to give security teams greater flexibility and control within the ...

What is Auto Remediation in Security? A SOC Guide to Faster Threat Response

The post What is Auto Remediation in Security? A SOC Guide to Faster Threat Response appeared first on AI Security Automation. The post What is Auto Remediation in Security? A SOC Guide to Faster Threat Response appeared first on Security Boulevard.

Is Your IAM Solution Truly Scalable?

Is Your Identity and Access Management Approach Up to the Task? Could you be unknowingly compromising your cybersecurity by overlooking the importance of Non-Human Identities (NHIs) and Secrets Security Management? These vital aspects of Identity ...

Enhancing Protection with Smart Secret Vaulting

Why is Smart Secret Vaulting a Milestone in Data Protection? Smart secret vaulting is a revolutionary milestone in data protection, offering impeccable defense against devastating data breaches. But how does it achieve this level of protection? ...

Gain Confidence with Proactive NHIDR

Could Proactive NHIDR Be the Key to Unwavering Cybersecurity Confidence? The security of our systems and data is fundamental to our business operations and customer trust. Security breaches not only risk loss of valuable information but can ...

The CBUAE’s SMS and OTP Ban is a Golden Opportunity

The Central Bank of the UAE has drawn a line in the sand. By March 2026, the era of the SMS and One-Time Passwords will be over for the nation's financial institutions. This is not a minor policy tweak. It's a seismic shift. For years, the ...