Tuesday, December 16, 2025
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Articles by Topic:
Application Security
The Codex Trap: Silent Config File Hijacks Dev Workflows
December 11, 2025
A new investigation from Check Point Research exposes a quietly dangerous flaw in OpenAI Codex, which helps developers write, debug, and refactor code. This isn’t an exotic attack. It's a realistic, low-skill avenue for supply-chain…
Read More >
GitLab’s AI Vulnerability Highlights the Dark Side of Prompt Injection
December 01, 2025
GitLab recently released new versions (18.5.2, 18.4.4, 18.3.6) of GitLab Community Edition (CE) and Enterprise Edition (EE) as an emergency patch for several new vulnerabilities. One of these vulnerabilities can enable attacks taking advantage of…
Read More >
RCE Flaw in Python-SocketIO Exposes a Trusted Assumption
November 04, 2025
For years, Python has been the go-to language for developers who value speed and simplicity. Its clean syntax and massive ecosystem make it easy to get things done fast. The newly disclosed CVE-2025-61765 flaw in…
Read More >
AI-Driven Development Fuels New Vulnerabilities
October 03, 2025
In the past several years, AI has gone through massive growth, rapidly expanding in capabilities, popularity, and reach. This has led to an explosion of AI-driven development and faster release cycles, but it has also…
Read More >
New Vulnerability Exposes Developers to Silent Code Execution
September 26, 2025
Developers using the popular AI-powered code editor Cursor may be exposing themselves to silent attacks the moment they open a project. Oasis Security uncovered a critical vulnerability that, unlike the typical IDE flaws rooted in…
Read More >
Why a Shared SBOM Vision Could Be the Key to Securing the Software Supply Chain
September 23, 2025
In an era of increasingly interconnected digital landscapes, the software supply chain is a crucial area to secure, affecting organizations across all sectors. Software supply chain attacks are on the rise among modern threats, and…
Read More >
How a Self-Propagating npm Attack Is Hunting Developer Secrets
September 23, 2025
A developer runs a routine update, the kind that happens dozens of times a week. Nothing unusual flashes on the screen. But buried inside the new package is a hidden file called bundle.js. The moment…
Read More >
UltraViolet Makes a Bet on Unified Offense-Defense for the AI Code Era
September 13, 2025
UltraViolet Cyber has acquired Black Duck’s Application Security Testing services business, a move that expands its portfolio and signals a shift in how software security will be delivered. The timing is notable: enterprises are churning…
Read More >
Crypto-Stealing Code Slips Into NPM
September 12, 2025
Josh Junon, a software developer and maintainer, revealed on social media this week that his account had been compromised and 18 of his popular JavaScript packages tampered with. The malicious updates injected code designed to…
Read More >
Snyk Acquires Invariant Labs to Defend Agentic AI Systems
July 17, 2025
Snyk has acquired Invariant Labs, an AI security research firm specializing in agentic systems, in a move to secure the next generation of intelligent software. Large language models (LLMs) and agentic AI architectures are rapidly…
Read More >
Outlook Crash Sparks Debate Over VDI Reliability and Hidden Security Risks
July 14, 2025
A recent issue with Microsoft’s Outlook email platform has caused the client to crash when users are composing or opening emails. The issue can impact users across all Microsoft 365 Office channels, with users who…
Read More >
Why Memory-Safe Languages Are Now a National Security Priority
July 07, 2025
The United States Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) recently published a joint guide, “The Case for Memory Safe Roadmaps: Why Both C-Suite Executives and Technical Experts Need to Take…
Read More >
Salesforce Industry Cloud Vulnerabilities Highlight Hidden Dangers of Low-Code Platforms
June 24, 2025
Low-code platforms like Salesforce’s Industry Cloud promise to speed up digital transformation by making it easier for organizations to build and deploy apps. With tools like OmniStudio, employees can quickly create workflows and interfaces tailored…
Read More >
Zero-Day Suspected in SAP NetWeaver Attacks
May 13, 2025
A newly uncovered attack is targeting SAP NetWeaver systems. According to researchers at ReliaQuest, threat actors are exploiting what appears to be a previously unknown vulnerability to quietly drop lightweight JSP web shells onto fully…
Read More >
What Microsoft’s 2024 Vulnerability Data Reveals About Cybersecurity Priorities
May 07, 2025
Findings from BeyondTrust’s recently released 12th annual Microsoft Vulnerabilities Report reveal a complex and evolving threat landscape. As evidence, consider that in 2024, Microsoft reported the highest number of vulnerabilities it has ever had (1,360).…
Read More >
Why 95% of Security Warnings Are Noise
May 06, 2025
Modern application security (AppSec) suffers from a number of issues, one of the main ones being alert fatigue. Human teams do not have the time or resources to verify and investigate every security alert, especially…
Read More >
Unpatched Erlang SSH Vulnerability Opens Door to Full System Takeover
May 02, 2025
Erlang/OTP plays a major role in telecom and distributed systems, enabling easy creation of concurrent, fault-tolerant, and robust systems. Erlang/OTP SSH is the most popular protocol for remote access management, and its compromise represents a…
Read More >
XCSSET: A New Variant That Targets Developers
March 28, 2025
Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a highly sophisticated modular macOS malware variant that injects malicious code into Xcode projects. Xcode is Apple’s integrated development environment (IDE) for macOS, which developers…
Read More >
Subscribe for the Latest News
"
*
" indicates required fields
Comments
This field is for validation purposes and should be left unchanged.
First Name
*
Last Name
*
Company Name
*
Job Title
*
Email
*
Country
*
Country *
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cambodia
Cameroon
Canada
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos Islands
Colombia
Comoros
Congo
Congo, Democratic Republic of the
Cook Islands
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Côte d'Ivoire
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine, State of
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Sweden
Switzerland
Syria Arab Republic
Taiwan
Tajikistan
Tanzania, the United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkmenistan
Turks and Caicos Islands
Tuvalu
Türkiye
US Minor Outlying Islands
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Åland Islands
Employee Count
*
Employee Count *
< 100 employees
100 to 249 employees
250 to 499 employees
500 to 999 employees
1,000 to 2,499 employees
2,500 to 4,999 employees
5,000 to 9,999 employees
10,000 to 24,999 employees
25,000+ employees
Industry
*
Industry *
Advertising & Marketing
Agriculture
Airlines & Aerospace (including Defense)
Automotive
Business Support & Logistics
Construction, Machinery and Homes
Education
Entertainment & Leisure
Finance & Financial Services
Food & Beverages
Government
Health Care & Pharmaceuticals
Insurance
Manufacturing
Nonprofit
Real Estate
Retail & Consumer Durables
Telecommunications, Technology, Internet & Electronics
Utilities, Energy, and Extraction
Other
Consent
*
I have read and agree to the Security Buzz
Privacy Policy
and understand that I may receive communications from Security Buzz and its partners by submitting this form.
*
CAPTCHA
Webinars
Tuesday, Dec. 16
1pm ET / 10am PT
The End of Legacy SAST & the Rise of Developer-First AppSec
Tuesday, Dec. 16
1pm ET / 10am PT
Threat Actors Unveiled: Abusing AI: How Adversaries Code, Campaign, and Collaborate with AI
Tuesday, Dec. 16
1pm ET / 10am PT
Closing the Gap: Understanding the True State of Ransomware Readiness