Application Security News and Articles


Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 2) appeared first on SecurityWeek.

Cybersecurity and the development of software-defined vehicles

In many automotive companies, the same systems-engineering teams are responsible for both safety and security. As a result, cybersecurity is treated as a subset of safety, undergirded by an implicit assumption: “If it’s safe, it must be ...

Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC

Adobe has released urgent security updates to resolve two AEM Forms vulnerabilities for which proof-of-concept (PoC) code exists. The post Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC appeared first on SecurityWeek.

Cyware unveils open-source MCP Server to power AI-driven cyber defense

Cyware has released Cyware MCP Server (Model Context Protocol Server) to advance the future of AI-powered cyber defense. The new open-source capability is purpose-built to enable generative AI-native workflows, allowing seamless integration ...

Sysdig Sage delivers AI-driven remediation and risk prioritization for cloud

Sysdig has unveiled an agentic cloud security platform. With Sysdig’s autonomous AI agents, designed to analyze cloud environments end to end and surface hidden business risks, organizations can remediate threats in minutes and deliver ...

Forter launches Identity Monitoring to secure agentic commerce

Forter has launched Identity Monitoring for agentic commerce, the first in a series of new capabilities that enable ecommerce enterprises to recognize both bot and human behavior and confidently trust AI agents from discovery through payment. ...

AI Agents in Cybersecurity: A Practical Roadmap for Leaders

A leader’s guide on deploying AI agents – from selecting use cases and establishing governance, to safety controls and showing the value. The post AI Agents in Cybersecurity: A Practical Roadmap for Leaders appeared first on Security Boulevard.

HPE unveils unified cybersecurity portfolio with AI-driven networking and data protection

HPE announced expansion of its cybersecurity, resiliency, and compliance solutions, taking a multi-layered approach to protect enterprises through industry-leading data, network, and system security. HPE is introducing its combined secure ...

RedSeal launches RedSeal One to simplify exposure management across hybrid environments

RedSeal unveiled RedSeal One, an AI-enabled exposure management platform designed to help organizations reduce risk, streamline operations, and strengthen resilience across hybrid environments. RedSeal One combines the company’s four ...

Searchlight Cyber unveils AI Agent to automate dark web threat actor summaries

Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web investigation platform, Cerberus. The Searchlight AI Agent uses the Cerberus’ dark web data lake to provide a quick overview of a ...

Concentric AI enhances data security with new platform integrations

Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with ...

ArmorCode enhances ASPM platform to address AI-generated code threats and CRA compliance

ArmorCode announced application security and remediation advancements to help customers address risks posed by AI-generated code and applications, along with imminent compliance demands from regulations including the Cyber Resilience Act (CRA). ...

TP-Link TL-WR3602BE secures travel Wi-Fi with built-in VPNs and Wi-Fi 7 speed

TP-Link has released the TL-WR3602BE, a high-performance Wi-Fi 7 travel router delivering speeds up to 3.6 Gbps. It features built-in VPN apps and multiple operating modes, making it a versatile choice for travel connectivity. Designed for ...

Ransomware is up, zero-days are booming, and your IP camera might be next

Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a surge in advanced tactics, with zero-day exploits up 46 percent and ransomware attacks averaging ...

AI in the SOC: Game-changer or more noise?

In this Help Net Security video, Kev Marriott, Senior Manager of Cyber at Immersive Labs, explores the challenges and opportunities of integrating AI into Security Operations Centers (SOCs). While AI can boost productivity by automating manual ...

CISOs say they’re prepared, their data says otherwise

Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500 U.S.-based IT and security leaders, ...

Why 90% of cyber leaders are feeling the heat

90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of AI and expanding attack surfaces, according to BitSight. These threats are also fueling high rates of burnout, with 47% of ...

Elevating Mobile Security Demystifying Push Authentication Protocols

Explore mobile push authentication protocols, including APNs and FCM, for enhanced security. Learn implementation strategies and future trends in mobile authentication. The post Elevating Mobile Security Demystifying Push Authentication Protocols ...

Mastering Passkey Management Safeguarding Your Passwordless Future

Learn how to effectively manage and recover passkeys in passwordless systems. Discover best practices, fallback options, and security considerations for a secure user experience. The post Mastering Passkey Management Safeguarding Your ...

FIDO2 WebAuthn Powering Passwordless Authentication’s Next Wave

Learn how to implement FIDO2/WebAuthn for passwordless authentication. This guide covers passkeys, security, and best practices for developers and IT professionals. The post FIDO2 WebAuthn Powering Passwordless Authentication’s Next Wave ...