Application Security News and Articles


BSidesSF 2025: Shadow IT Battlefield: The CyberHaven Breach And Defenses That Worked

Creators, Authors and Presenters: Rohit Bansal, Zach Pritchard Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius

A threat group Google tracks as UNC6395 has pilfered troves of data from Salesforce corporate instances, in search of credentials that can be used to compromise those organizations’ environments. “[Google Threat Intelligence Group] ...

AI is becoming a core tool in cybercrime, Anthropic warns

A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and extortion. ...

AI, Malware, and the Rise of Software Development Infiltration

For years, security teams focused on defending against malicious code injected into open source projects and package repositories. At Sonatype, we've tracked espionage campaigns, shadow downloads, and targeted malware designed to compromise ...

Email Security’s Blind Spot: Hidden Threats in Attachments

The post Email Security’s Blind Spot: Hidden Threats in Attachments appeared first on Votiro. The post Email Security’s Blind Spot: Hidden Threats in Attachments appeared first on Security Boulevard.

How to Assess Your Organization’s Cyberfraud Protection Maturity & Readiness

Discover how to assess and advance your cyberfraud protection maturity with practical strategies and the Cyberfraud Protection Maturity Model for CISOs. The post How to Assess Your Organization’s Cyberfraud Protection Maturity & Readiness ...

Nevada State Offices Closed Following Disruptive Cyberattack

State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected. The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek.

Cyber Threat Protection for K-12 Schools | Protecting Students and Teachers from Rising Cyberattack

As students head back to school, Contrast Security customers are getting ready for more sophisticated cyberattacks. Dark Reading published a feature on the growing risks facing K-12 schools.  The post Cyber Threat Protection for K-12 Schools | ...

Unit21 BYOA automates fraud and AML tasks

Unit21 has launched its Build Your Own Agent (BYOA) for banks, credit unions, and fintechs. The product enables risk and compliance teams to automate fraud and AML tasks, turning hours of manual data gathering, sorting and sifting into just ...

Qwiet AI empowers developers in shipping secure software faster

Qwiet AI has unveiled updates to its application security platform. These updates, which include expanded integrations across Azure DevOps, Azure Boards, and GitHub, and the introduction of new AI-powered AutoFix capabilities and an enhanced user ...

Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime

Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide. The post Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime appeared first on SecurityWeek.

Citrix Patches Exploited NetScaler Zero-Day

Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies. The post Citrix Patches Exploited NetScaler Zero-Day appeared first on SecurityWeek.

PromptLock: First AI-Powered Ransomware Emerges

Proof-of-concept ransomware uses AI models to generate attack scripts in real time. The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek.

300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158

Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which Plex has issued a fix for earlier this month, Censys has warned. About CVE-2025-34158 Plex Media Server ...

We Are Still Unable to Secure LLMs from Malicious Inputs

Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks ...

Remote Access Security

Seceon’s AI/ML and Dynamic Threat Modeling (DTM) powered cybersecurity solutions are designed to close this gap, providing enterprises and Managed Security Service Providers (MSSPs) with an intelligent, automated, and cost-effective way to ...

Executive Dark Web Exposure: Protecting your Leadership

Nisos Executive Dark Web Exposure: Protecting your Leadership Not long ago, a Social Security number (SSN) felt like a vault key. Private, protected, rarely seen. Today, it’s more like currency... The post Executive Dark Web Exposure: ...

Choosing the Right Technology Stack for Your Web Application

Learn how to choose the right technology stack for your web app. Ensure scalability, performance, and long-term growth with expert guidance. The post Choosing the Right Technology Stack for Your Web Application appeared first on Security Boulevard.

Fraudulent email domain tracker: August 2025

This is the fifth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in July's report, our goal is to equip security and anti-fraud teams with greater visibility into the email infrastructure ...

The Importance Of Ensuring Robust APIs For Your Applications Through Testing

Learn why API testing is essential for performance, security, and reliability. Detect bugs early and boost your app’s quality. The post The Importance Of Ensuring Robust APIs For Your Applications Through Testing appeared first on Security ...