Application Security News and Articles


CVE-2025-7775: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organizations are urged to patch immediately. Background On August 26, Citrix published a ...

Zero Trust Microsegmentation with ColorTokens’ Progressive Segmentation for IT and OT Convergence in Industry 4.0

The convergence of Information Technology (IT) and Operational Technology (OT) in Industry 4.0 (allows for smart manufacturing and the creation of intelligent factories) environments, such as manufacturing, energy, and critical infrastructure, ...

Farmers Group Loses 1.111M PII Rows: It’s Salesforce Again

ShinyHunters Hunt Again: Scattered Spider claims another Salesforce instance—albeit three months ago. The post Farmers Group Loses 1.111M PII Rows: It’s Salesforce Again appeared first on Security Boulevard.

BSidesSF 2025: WHOIS Your Daddy: Tracking Iranian-Backed Cyber Operations With Passive DNS

Creator, Author and Presenter: Austin Northcutt Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Beyond the Prompt: Building Trustworthy Agent Systems

Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek.

When Connecting Your Security Data: Simplicity is Key

In this blog, you’ll learn how to add a source, route data to your destinations, and apply AI-recommended filtering rules in clicks, giving your team faster visibility and measurable cost savings. The post When Connecting Your Security Data: ...

Why Enterprises are Betting on Agile PODs to Build Their Next Billion-Dollar Product

Every enterprise claims they want to build the “next Tesla” or “next Amazon.” But here’s the uncomfortable truth: most of them are still running product...Read More The post Why Enterprises are Betting on Agile PODs to Build Their Next ...

SpyCloud Consumer IDLink unifies fragmented identity exposures

SpyCloud released the Consumer IDLink solution, designed to help financial institutions and other consumer-facing organizations reduce risk and prevent fraud stemming from consumer identity exposures. Consumer IDLink, delivered via API, uses ...

Cloud and IoT Security Platform

In today’s digital landscape, hybrid cloud security and IoT/OT cybersecurity are mission-critical. Gartner predicts that 90% of organizations will adopt a hybrid cloud approach by 2027, and industry reports show that roughly one in three data ...

NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)

Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which (CVE-2025-7775) has been targeted in zero-day attacks. “Exploits of CVE-2025-7775 on ...

The Foundation Is Cracking: Why Hardware Security Can’t Be an Afterthought Anymore

I was scrolling through my security feeds this morning when I came across news that MITRE has finally updated their Most Important Hardware Weaknesses List. While this should have been cause for celebration, I found myself feeling more frustrated ...

Healthcare Services Group Data Breach Impacts 624,000

The personal information of many individuals was stolen from Healthcare Services Group’s computer systems in 2024. The post Healthcare Services Group Data Breach Impacts 624,000 appeared first on SecurityWeek.

Dynamic Authorization vs. Static Secrets: Rethinking Cloud Access Controls

6 min readLearn why static secrets fail in modern environments and how to implement dynamic authorization. The post Dynamic Authorization vs. Static Secrets: Rethinking Cloud Access Controls appeared first on Aembit. The post Dynamic ...

Custom Controls: Beyond NIST SP 800-53

Extend Q-Compliance's capabilities beyond its out-of-the box offerings! Custom Controls allow organizations meet compliance objectives with unique requirements, procedures and risk profiles. The post Custom Controls: Beyond NIST SP 800-53 first ...

Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover

Hello! My name is Kirill Ziborov, and I’m a formal verification engineer and security researcher at Positive Web3. From February 24 to March 18, an audit contest for the Blend protocol on the Stellar blockchain was held on the Code4rena. In ...

Aembit Introduces GitLab Credential Lifecycle Management and GitLab Component

7 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management. The post Aembit Introduces GitLab Credential Lifecycle Management and GitLab ...

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Silver Spring, USA / Maryland, 26th August 2025, CyberNewsWire The post Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab appeared first on Security Boulevard.

Key findings from “The State of Embedded Software Quality and Safety 2025” report

Discover key trends and challenges in embedded software development, from AI integration to SBOM compliance. Learn how Black Duck's solutions can help ensure quality and safety. The post Key findings from “The State of Embedded Software ...

Data Blindness is the Silent Threat Undermining AI, Security and Operational Resilience

Data blindness is emerging as one of the biggest business risks of the AI era — without visibility, organizations can’t trust their data. The post Data Blindness is the Silent Threat Undermining AI, Security and Operational Resilience ...

7 Best People Search Platform to Strengthen KYC and Fraud Detection Processes

Leading solutions in best people search sites. How to effectively choose the optimal platform to improve your know your customer and fraud detection processes. The post 7 Best People Search Platform to Strengthen KYC and Fraud Detection Processes ...