Application Security News and Articles


Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Frankfurt am Main, Germany, 20th August 2025, CyberNewsWire The post Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform appeared first on Security Boulevard.

BSidesSF 2025: Threat Modeling Meets Model Training: Web App Security Skills For AI

Creator, Author and Presenter: Breanne Boland Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models

Instead of GPT-5 Pro, your query could be quietly redirected to an older, weaker model, opening the door to jailbreaks, hallucinations, and unsafe outputs. The post GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models ...

Slow and Steady Security: Lessons from the Tortoise and the Hare

By focusing on fundamentals, enterprises can avoid the distraction of hype and build security programs that are consistent, resilient, and effective over the long run. The post Slow and Steady Security: Lessons from the Tortoise and the Hare ...

Commvault plugs holes in backup suite that allow remote code execution

Commvault has fixed four security vulnerabilities that may allow unauthenticated attackers to compromise on-premises deployments of its flagship backup and replication suite. Technical details about the vulnerabilities have been published on ...

The Future of Pentesting: Can AI Replace Human Expertise? ⎥ Jyoti Raval

Discover insights from The Elephant in AppSec episode with Jyoti Raval The post The Future of Pentesting: Can AI Replace Human Expertise? ⎥ Jyoti Raval appeared first on Security Boulevard.

Apache ActiveMQ Breach Reveals Unusual Attacker Behavior

Security researchers have confirmed that a recent wave of cyberattacks is exploiting a critical vulnerability in Apache ActiveMQ, allowing attackers to compromise Linux servers and install long-term persistence tools. The attackers are not only ...

Elastic Refutes Claims of Zero-Day in EDR Product

Elastic has found no evidence of a vulnerability leading to RCE after details and PoC of a Defend EDR bypass were published online. The post Elastic Refutes Claims of Zero-Day in EDR Product appeared first on SecurityWeek.

StackHawk empowers security teams to expand their API testing coverage

StackHawk releaseed LLM-Driven OpenAPI Specifications, a powerful new capability that creates API documentation directly from source code, empowering security teams to expand their API testing coverage without relying on developers. This ...

Survey: Enterprise IT Teams Spend 11 Hours Investigating Identity Incidents

A survey of 370 IT and cybersecurity decision makers in organizations with at least 100 employees published today finds, on average, enterprise IT organizations are spending 11 person-hours investigating and remediating each critical ...

Ransomware Disrupts Inotiv Operations

Inotiv, a pharmaceutical research and drug development company based in Indiana, has disclosed a ransomware attack that encrypted parts of its IT environment and disrupted day-to-day operations. The company filed notice of the incident with the ...

LastPass now supports passkeys

LastPass announced passkey support, giving users and businesses a simpler, more secure way to log in across a variety of devices, browsers, and operating systems. Starting now, passkeys can be created, stored, and managed directly in the LastPass ...

Inside the CTEM Boom: Pioneers, Followers, and What Black Hat 2025 Made Clear

Black Hat 2025 had it all. Vegas heat outside, but inside the halls were packed with energy – nonstop conversations, bold ideas, and the kind of buzz you can’t fake.... The post Inside the CTEM Boom: Pioneers, Followers, and What Black Hat ...

Password crisis in healthcare: Meeting and exceeding HIPAA requirements

In 2025, healthcare organizations are facing a new wave of password security risks. Recent data from the HIMSS Cybersecurity Survey reveals that 74% experienced at least one significant security incident over the last year. More than half of ...

Medusa Ransomware: How to Break the Kill Chain Before It Starts

The post Medusa Ransomware: How to Break the Kill Chain Before It Starts appeared first on Votiro. The post Medusa Ransomware: How to Break the Kill Chain Before It Starts appeared first on Security Boulevard.

RapperBot Botnet Disrupted, American Administrator Indicted

The US Department of Justice has announced the takedown of the RapperBot botnet and charges against its American administrator. The post RapperBot Botnet Disrupted, American Administrator Indicted appeared first on SecurityWeek.

The New Frontier: Why You Can’t Secure AI Without Securing APIs

The release of a new KuppingerCole Leadership Compass is always a significant event for the cybersecurity industry, offering a vendor-neutral view of the market's current state. The 2025 edition, focusing on API Security and Management, is ...

Seemplicity Raises $50 Million for Exposure Management Platform

Seemplicity announced a Series B funding round that will be used to create AI agents for its exposure management solution. The post Seemplicity Raises $50 Million for Exposure Management Platform appeared first on SecurityWeek.

Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data

CERT/CC has disclosed the details of information exposure vulnerabilities in a Workhorse Software application after patches were released.  The post Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data appeared first on ...

Pharmaceutical Company Inotiv Confirms Ransomware Attack

Inotiv has notified the SEC that its business operations took a hit after hackers compromised and encrypted its internal systems. The post Pharmaceutical Company Inotiv Confirms Ransomware Attack appeared first on SecurityWeek.