Application Security News and Articles


Brute-force attacks hammer Fortinet devices worldwide

A surge in brute-force attempts targeting Fortinet SSL VPNs that was spotted earlier this month could be a portent of imminent attacks leveraging currently undisclosed (potentially zero-day) vulnerabilities in Fortinet devices. Shifting attacks ...

The Laws of Software Haven’t Changed. We’re Just Choosing to Forget Them

We're in the middle of something that feels like a renaissance — a golden age of software creation that's less about syntax and more about prompting. At Black Hat 2025 last week, every conversation revolved around AI. As GPT-5 rolls out, the AI ...

During Deadly Floods, Central Texas Hit with Online Scams: BforeAI

In the 10 days after the deadly floods in Central Texas began, researcher's with BeforeAI's PreCrime Labs identified more than 70 malicious or suspicious domains that used the natural disaster to steal money and information from victims or those ...

Palo Alto Networks helps organizations accelerate their quantum readiness

Palo Alto Networks announced two new security solutions to help organizations confidently navigate the quantum landscape, and to keep pace with highly dynamic cloud and AI environments. These innovations provide enterprises with the visibility, ...

CISA Warns of Attacks Exploiting N-able Vulnerabilities

CISA reported becoming aware of attacks exploiting CVE-2025-8875 and CVE-2025-8876 in N-able N-central on the day they were patched. The post CISA Warns of Attacks Exploiting N-able Vulnerabilities appeared first on SecurityWeek.

For $40, you can buy stolen police and government email accounts

Active police and government email accounts are being sold on the dark web for as little as $40, giving cybercriminals a direct line into systems and services that rely on institutional trust. According to new research from Abnormal AI, the ...

Beyond the Prompt: Securing the “Brain” of Your AI Agents

Imagine an autonomous AI agent tasked with a simple job: generating a weekly sales report. It does this reliably every Monday. But one week, it doesn't just create the report. It also queries the customer database, exports every single record, ...

The 6 Steps of the Third-Party Risk Management Lifecycle

Third-party risk management (TPRM) is no longer a periodic compliance exercise; it’s a strategic imperative. As organizations expand their digital ecosystems, managing third-party risk becomes more complex and critical. Siloed point solutions, ...

‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks

The new DDoS attack vector, which involves HTTP/2 implementation flaws, has been compared to Rapid Reset. The post ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks appeared first on SecurityWeek.

IBM 2025 Cost of a Data Breach Report: Lessons for API and AI Security

IBM’s 2025 Cost of a Data Breach Report offers one of the clearest and most comprehensive views yet of how AI adoption is shaping the security landscape.  While breach numbers are relatively low – only 13% of organizations reported breaches ...

Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)

Two vulnerabilities (CVE-2025-8875, CVE-2025-8876) in N-central, a remote monitoring and management (RMM) solution by N-able that’s popular with managed service providers, are being exploited by attackers. There are no public reports of ...

An Updated CRQ Solution for Context & Communication | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post An Updated CRQ Solution for Context & Communication | Kovrr appeared first on Security Boulevard.

Passkey Login Bypassed via WebAuthn Process Manipulation

Researchers at enterprise browser security firm SquareX showed how an attacker can impersonate a user and bypass passkey security.  The post Passkey Login Bypassed via WebAuthn Process Manipulation appeared first on SecurityWeek.

How SSO Reduces Login Fatigue and Improves Security Compliance

Learn how Single Sign-On reduces login fatigue, improves compliance, and enhances productivity while keeping systems secure. The post How SSO Reduces Login Fatigue and Improves Security Compliance appeared first on Security Boulevard.

Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products

Overview On August 13, NSFOCUS CERT detected that Microsoft released the August Security Update patch, which fixed 111 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Visual Studio, and ...

Brivo Visitor Management, powered by Envoy, boosts front-desk security

Brivo a strategic partnership with Envoy. The integration brings Envoy’s workplace platform, designed to connect people, spaces, and data, into Brivo Security Suite. Together, Brivo Visitor Management powered by Envoy merges workplace ...

AI security governance converts disorder into deliberate innovation

AI security governance provides a stable compass, channeling efforts and transforming AI from an experimental tool to a reliable, enterprise-class solution. With adequate governance built at the center of AI efforts, business leaders can shape AI ...

Open-source flow monitoring with SENSOR: Benefits and trade-offs

Flow monitoring tools are useful for tracking traffic patterns, planning capacity, and spotting threats. But many off-the-shelf solutions come with steep licensing costs and hardware demands, especially if you want to process every packet. A ...

The top CTEM platforms you should know in 2025

Continuous Threat Exposure Management (CTEM) is a modern cybersecurity strategy originally coined by Gartner analysts, which focuses on identifying, prioritizing, validating, and mobilizing teams to reduce threat exposure across an ...

Free courses: Master AI tools from Microsoft, AWS, and Google

Learn how AI technologies can be applied to enhance security, create safe and responsible applications, develop intelligent agents, and improve information discovery. You’ll gain practical skills, explore new tools, and work on projects ...