Application Security News and Articles


Scaling Secrets Security for Large Enterprises

Why is Scaling Secrets Security Crucial for Large Enterprises? Large enterprises hold vast amounts of sensitive information, such as customer data and intellectual property, securely stored within their corporate networks. These organizations ...

How DataDome Blocked 214M+ Malicious Requests With Server-Side Behavioral Detection

DataDome’s server-side behavioral detection blocked over 214 million malicious requests from a single IP targeting a global travel platform without downtime or disruption. The post How DataDome Blocked 214M+ Malicious Requests With Server-Side ...

BSidesSF 2025: Netsec Is Dead(?): Modern Network Fingerprinting For Real-World Defense

Creator/Author/Presenter: Vlad Iliushin Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Randall Munroe’s XKCD ‘Kite Incident’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Kite Incident’ appeared first on Security Boulevard.

IRONSCALES Scores Big in G2 Summer 2025 Awards

 IRONSCALES is thrilled to announce that it has once again been recognized by G2, earning multiple Summer 2025 badges that reflect customers’ satisfaction and the platform’s market impact.  The post IRONSCALES Scores Big in G2 Summer 2025 ...

How to Securely Access AWS from your EKS Cluster

Discover EKS Pod Identity Association—the modern, secure way to grant AWS permissions without the operational overhead of OIDC providers. No more duplicated IAM roles across clusters, no more trust policy updates every time you scale. The post ...

What the Matter 1.4.2 update means for smart home security

Matter is built on the idea that smart home devices should be secure, reliable, and easy to use. It is based on Internet Protocol (IP), which allows devices, mobile apps, and cloud services to communicate. Matter also defines a set of IP-based ...

BSidesSF 2025: Confidential Computing: Protecting Customer Data In The Cloud

Creator/Author/Presenter: Jordan Mecom Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

The Future of Continuous Access Control: OpenID CAEP

Most apps check user trust once during login—then ignore security changes for hours or days. OpenID CAEP changes this by enabling real-time communication between security systems. When a user's context changes, every connected app knows ...

Chrome Sandbox Escape Earns Researcher $250,000

A researcher has been given the highest reward in Google’s Chrome bug bounty program for a sandbox escape with remote code execution. The post Chrome Sandbox Escape Earns Researcher $250,000 appeared first on SecurityWeek.

Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike

New physics-based research suggests large language models could predict when their own answers are about to go wrong — a potential game changer for trust, risk, and security in AI-driven systems. The post Managing the Trust-Risk Equation in AI: ...

Win-DDoS: Attackers can turn public domain controllers into DDoS agents

SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs ...

Connex Credit Union Data Breach Impacts 172,000 People

Hackers targeted Connex, one of the largest credit unions in Connecticut, and likely stole files containing personal information.  The post Connex Credit Union Data Breach Impacts 172,000 People appeared first on SecurityWeek.

BERT Ransomware

A New Breed of Cyber Threat A new ransomware strain is making waves, not just for its technical prowess but also for the mystery behind its name: BERT Ransomware. As businesses and individuals race to defend themselves against increasingly ...

External Network Penetration Testing Checklist for 2025

External network penetration testing is one of the best methods to find any vulnerability that can be exploited before it happens outside of your organization. New scoring systems, voluntary compliance... The post External Network Penetration ...

Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft

A researcher has demonstrated how a platform used by over 1,000 dealerships in the US could have been used to hack cars. The post Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft appeared first on ...

Identity-first Security for AI Agents

Join us for our next industry webinar where we'll be diving into the world of Agent AI security. The post Identity-first Security for AI Agents appeared first on The Cyber Hut. The post Identity-first Security for AI Agents appeared first on ...

WinRAR zero day exploited by RomCom hackers in targeted attacks

ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you use WinRAR or related components such as the Windows versions of its command line tools, UnRAR.dll, or the ...

Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada

WinRAR has patched CVE-2025-8088, a zero-day exploited by Russia’s RomCom in attacks on financial, defense, manufacturing and logistics companies. The post Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada appeared first on ...

BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats 

Eclypsium researchers have demonstrated a BadCam attack against Lenovo cameras, but others may be impacted as well. The post BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats  appeared first on SecurityWeek.