Application Security News and Articles


Lema AI Emerges From Stealth With $24 Million to Tackle Third-Party Risk 

The funding was raised over Series A and seed funding rounds for its supply chain security solution. The post Lema AI Emerges From Stealth With $24 Million to Tackle Third-Party Risk  appeared first on SecurityWeek.

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

As only data exfiltration for extortion no longer delivers ROI, ransomware gangs may increasingly encrypting data for additional leverage. The post Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter appeared first on ...

Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats

The Series B funding round brings the cybersecurity startup’s total raised to $60 million. The post Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats appeared first on SecurityWeek.

Cybersecurity M&A Roundup: 34 Deals Announced in January 2026

Significant cybersecurity M&A deals announced by CrowdStrike, Infoblox, JumpCloud, LevelBlue, OneSpan, and Radware. The post Cybersecurity M&A Roundup: 34 Deals Announced in January 2026 appeared first on SecurityWeek.

Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Vulnerable SolarWinds Web Help Desk instances were exploited in December 2025 for initial access. The post Recent SolarWinds Flaws Potentially Exploited as Zero-Days appeared first on SecurityWeek.

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools says customers were impacted after hackers compromised a data center used for quality control testing. The post SmarterTools Hit by Ransomware via Vulnerability in Its Own Product appeared first on SecurityWeek.

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA’s KEV Catalog

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it. The post New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA’s KEV Catalog appeared first on SecurityWeek.

European Commission Investigating Cyberattack

The signs of a cyberattack were identified on systems EU's main executive body uses for mobile device management. The post European Commission Investigating Cyberattack appeared first on SecurityWeek.

Organizations Urged to Replace Discontinued Edge Devices

Edge devices that are no longer supported have been targeted in attacks by state-sponsored hackers, the US says. The post Organizations Urged to Replace Discontinued Edge Devices appeared first on SecurityWeek.

Flickr Security Incident Tied to Third-Party Email System

Potential breach at Flickr exposes usernames, email addresses, IP addresses, and activity data. The post Flickr Security Incident Tied to Third-Party Email System appeared first on SecurityWeek.

What is Enterprise Identity — And Why Most Companies Get SSO & RBAC Catastrophically Wrong

Authentication requirements block 75-80% of enterprise deals, costing B2B SaaS companies millions annually. After scaling identity to 1B+ users while supporting hundreds of enterprise customers, here's why most companies get SSO and RBAC ...

Why are IT leaders optimistic about future AI governance

Are Machine Identities the Key to Strengthening AI Governance? How do organizations effectively manage the security of their infrastructure while fostering innovation through artificial intelligence? One answer lies in the management of Non-Human ...

How do Agentic AI systems deliver value in real-time operations

The Role of Non-Human Identities in Real-Time Operations What role do Non-Human Identities (NHIs) play in optimizing real-time operations across various industries? Where Agentic AI and similar technologies are reshaping operational, ...

How capable are current secrets rotation systems in preventing breaches

How Does Effective NHI Management Enhance Breach Prevention Strategies? What are organizations doing to protect against breaches caused by compromised Non-Human Identities (NHIs) and secrets? Where enterprises increasingly transition to cloud ...

Are investments in Privileged Access Management justified by results

Are PAM Investments Justified in the Realm of Non-Human Identities? What makes investing in Privileged Access Management (PAM) truly worthwhile when we focus on the management of Non-Human Identities (NHIs)? While we navigate intricate ...

NDSS 2025 – Understanding Data Importance In Machine Learning Attacks

Session 7D: ML Security Authors, Creators & Presenters: Rui Wen (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information ...

Randall Munroe’s XKCD ‘Chessboard Alignment’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chessboard Alignment’ appeared first on Security Boulevard.

NDSS 2025 – AlphaDog: No-Box Camouflage Attacks Via Alpha Channel Oversight

Session 7D: ML Security Authors, Creators & Presenters: Qi Xia (University of Texas at San Antonio), Qian Chen (University of Texas at San Antonio) PAPER AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight Traditional black-box ...

Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

UNFInished business: We were warned this would happen. And now here we are. The post Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard.

Arkose Labs Android SDK: Enhanced Protection with Mobile Integrity Check

Arkose Labs offers comprehensive mobile SDKs for both Android and iOS, delivering enterprise-grade fraud prevention across major platforms. Now, we’re enhancing our Android SDK with Mobile Integrity Check—powered by Google Play Integrity ...