Application Security News and Articles


NDSS 2025 – Oreo: Protecting ASLR Against Micro-Architectural Attacks

SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan (Massachusetts Institute of ...

Cybercriminals exploit RMM tools to steal real-world cargo

Cybercriminals are compromising logistics and trucking companies by tricking them into installing remote monitoring and management (RMM) tools, Proofpoint researchers warned. The attackers’ end goal is to hijack freight shipments and sell the ...

Delinea Platform now available to IBM customers through expanded partnership

Delinea has announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers. This new agreement deepens a strategic collaboration that began between the two companies in 2018. The Delinea ...

The Usual Suspects: 9 Dangerous File Types Every CISO Should Know

The post The Usual Suspects: 9 Dangerous File Types Every CISO Should Know appeared first on Votiro. The post The Usual Suspects: 9 Dangerous File Types Every CISO Should Know appeared first on Security Boulevard.

Transportation Companies Hacked to Steal Cargo

Threat actors engage in elaborate attack chains to infect trucking and logistics companies with remote access tools. The post Transportation Companies Hacked to Steal Cargo appeared first on SecurityWeek.

DefectDojo unveils Sensei, an AI-powered cybersecurity consultant

DefectDojo has announced DefectDojo Sensei, an AI agent designed to serve as the ultimate cybersecurity consultant. Sensei is the first super-intelligent agent of its kind in cybersecurity, leveraging self-training evolution algorithms to deliver ...

CyberArk launches Secure AI Agents to safeguard privileged AI identities

CyberArk is announcing the general availability of the CyberArk Secure AI Agents Solution, expanding the CyberArk Identity Security Platform with privilege controls to secure the rapidly growing class of AI agent identities. As organizations ...

Denmark’s Digital Defense 2025: AI Security Cutting Cyber Losses by Billions

Executive Snapshot Denmark stands among Europe’s most digital and connected economies – but that very strength has created one of the continent’s widest attack surfaces.With 92% of Danish organizations now running on cloud infrastructure ...

The Real Cost of Cryptojacking 

Cryptojacking silently hijacks compute power, inflates cloud bills, and erodes performance. Beyond financial losses, it exposes deep security risks, damages reputation, and drains productivity—making proactive detection and prevention essential ...

Hacker Conversations: Kunal Agarwal and the DNA of a Hacker

For Agarwal, being a hacker is not what you do, but who you are; that is, someone who always questions the status quo and questions how it could be different. The post Hacker Conversations: Kunal Agarwal and the DNA of a Hacker appeared first on ...

Forescout eyeSentry platform delivers continuous, cloud-based exposure management

Forescout has announced the launch of eyeSentry, a cloud-native exposure management solution that redefines how enterprises identify and mitigate hidden risks across IT, IoT, and IoMT environments. As hybrid and cloud environments expand, ...

SesameOp Malware Abuses OpenAI API 

A component of the newly discovered SesameOp backdoor uses the API to store and relay commands from the C&C server. The post SesameOp Malware Abuses OpenAI API  appeared first on SecurityWeek.

Why Protectionism Won’t Make Europe a Cybersecurity Powerhouse

Rethinking Digital Sovereignty: Building Value, Not Walls The post Why Protectionism Won’t Make Europe a Cybersecurity Powerhouse appeared first on Security Boulevard.

Bugcrowd expands AI-powered, human-led security with Mayhem Security acquisition

Bugcrowd has announced the acquisition of Mayhem Security to advance the next generation of AI-powered, human-in-the-loop security testing. Bugcrowd aims to help organizations ship safer software faster, at lower cost, and with greater ...

Bugcrowd Acquires Application Security Firm Mayhem

Bugcrowd said the acquisition of Mayhem has nearly doubled its valuation — previously reported at over $1 billion. The post Bugcrowd Acquires Application Security Firm Mayhem appeared first on SecurityWeek.

2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks

Baltimore, USA, 4th November 2025, CyberNewsWire The post 2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks appeared first on Security Boulevard.

AI Agents Mark the End of Traditional GRC 

AI agents are transforming governance and compliance from slow, manual processes into real-time, autonomous systems. By eliminating data silos, automating risk assessments, and enabling multi-modal collaboration, enterprises can achieve ...

Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware

A ransomware negotiator and an incident response manager have been indicted in Florida for allegedly conspiring to deploy the ALPHV/BlackCat ransomware against multiple US companies and extorting nearly $1.3 million from one of the victims. ...

Deepwatch Launches NEXA™: The MDR Industry’s First Collaborative Agentic AI Ecosystem for Unparalleled Security Outcomes

Intelligent AI agents work in collaboration with humans to redefine MDR with clear, actionable insights that accelerate threat resolution and strengthen security posture Palo Alto, CA—November 4, 2025—Deepwatch, the leader in Precision MDR ...

K-12 Google & Microsoft Security and Safety Through a “Single Pane of Glass”

Cloud Monitor Helps Tyrone Area School District’s IT Team Keep Accounts Secure, Students Safe, and Security Budget Justified Tyrone Area School District, located in Tyrone, Pennsylvania, serves a community of approximately 1,700 students and ...