Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Minimizing False Positives: Enhancing Security Efficiency

Organizations waste enormous amounts of time chasing down security alerts that turn out to be nothing. Recent research from May 2025 shows that 70% of a security team's time is spent investigating alerts that are false positives, wasting massive amounts of time in the investigation rather than working on proactive security measures to improve organizational security posture.

How Secure Is WhatsApp in 2025? [Appknox's Pentesters Reveal 5 Critical Vulnerabilities]

June 2025 has seen WhatsApp back in the headlines—this time for all the wrong reasons. Earlier this month, The National broke the story: WhatsApp’s security is under renewed scrutiny following revelations that Israel remains the only known actor to have successfully exploited it. But if history has taught us anything, it’s this: if one nation-state can do it, others may follow. At Appknox, we decided to verify the current state of WhatsApp’s mobile app security for ourselves.

How hacktivist cyber operations surged amid Israeli-Iranian conflict

In June 2025, Israel carried out airstrikes against key Iranian military and nuclear facilities. Iran swiftly retaliated, escalating regional tensions to unprecedented levels. This military confrontation has not only unfolded in conventional warfare but also triggered a massive surge in cyber operations. Almost immediately after the kinetic attacks, numerous hacktivist groups began launching cyberattacks primarily targeting Israel and its international allies.

CVE-2024-58248: Race condition vulnerability leaves nopCommerce at risk of single-packet attacks

I recently discovered an interesting race condition vulnerability in the eCommerce software nopCommerce, during a manual pen test as part of the SWAT service (SWAT is Outpost24’s Pen Testing as a Service solution). This vulnerability (CVE-2024-58248) involves nopCommerce, an open-source eCommerce platform written in C#, which aids developers in building online stores. When exploited, it allows an attacker user to redeem a gift card multiple times by using a technique called a single-packet attack.

Exposure Management vs. Vulnerability Management: Key Differences and Why They Matter

Vulnerability management has hit a wall. Exposure management is how forward-looking teams break through it. According to Gartner, by 2026, organizations that adopt a continuous exposure management approach to guide security investments will be three times less likely to experience a breach. a more advanced and iterative approach to vulnerability management. Despite growing interest, confusion remains around what exposure management is and how it differs from vulnerability management.

SquareX Reveals that Employees are No Longer the Weakest Link, Browser AI Agents Are

PALO ALTO, Calif., June 30, 2025 - Every security practitioner knows that employees are the weakest link in an organization, but what if this is no longer the case? SquareX's research reveals that Browser AI Agents are more likely to fall prey to cyberattacks than employees, making them the new weakest link that enterprise security teams need to look out for.

What Is FedRAMP Vulnerability Scanning? Requirements, Tools & Best Practices

For any cloud service provider (CSP) aiming to work with the U.S. federal government, understanding the Federal Risk and Authorization Management Program (FedRAMP) is due diligence. This government-wide initiative standardizes the assessment, authorization, and monitoring of cloud products for security.

Essential Features to Look for in a VM Solution

Your vulnerability management solution is the fuel that powers the rest of your strategic cybersecurity objectives. Put good in, get good out. That's why the vulnerability management tool you choose matters. And there are a lot of features that are necessary to protect a modern environment today that weren't on the list before. Done right, VM provides a stable foundation for cyber hygiene and regulatory compliance.

Fixing Fix Fatigue: Building Developer Trust for Secure AI Code

AI coding assistants are transforming the way developers work. With a prompt and a click, entire blocks of logic appear, boilerplate fades into the background, and velocity shoots up. But as anyone who’s integrated these tools into their daily routine can tell you, increased speed can come with increased risk. Vulnerabilities sneak in. Fixes pile up. And somewhere in the blur, developer trust begins to erode.