Application Security News and Articles


Cohesity RecoveryAgent automates time-consuming and manual tasks

Cohesity announced Cohesity RecoveryAgent, a new AI-powered cyber orchestration solution for Cohesity NetBackup and DataProtect customers. RecoveryAgent automates cyber recovery preparation, testing, compliance, and response, enabling customers ...

BlinkOps Security Agent Builder enables organizations to create unlimited AI agents

BlinkOps launched No-Code Security Agent Builder, an enterprise platform that allows security teams to create an unlimited number of custom security agents tailored for their unique environments. The platform gives organizations full control over ...

Veeam simplifies the protection of organizations’ Microsoft Entra ID users

Veeam Software announced Veeam Data Cloud for Microsoft Entra ID. With Entra ID (formerly Azure AD) facing over 600 million attacks daily, protecting organizations’ digital identity has never been more critical. Veeam Data Cloud for Microsoft ...

Ivanti Ring Deployment reduces risks associated with patching systems

Ivanti has launched Ring Deployment in Ivanti Neurons for Patch Management. The new capability allows IT teams to reduce risks associated with patching systems by creating and configuring deployment rings, enabling them to strategically group ...

Korean Telco Giant SK Telecom Hacked

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection. The post Korean Telco Giant SK Telecom Hacked appeared first on SecurityWeek.

When confusion becomes a weapon: How cybercriminals exploit economic turmoil

It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break rooms, anxiety ripples at every level. People ...

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories

By connecting powerful language models like GPT-4o and Claude Sonnet 3.5 to real-world tools, the open-source tool SWE-agent allows them to autonomously perform complex tasks: from fixing bugs in live GitHub repositories and solving cybersecurity ...

The dark side of YouTube: Malicious links, phishing, and deepfakes

With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and comments. Some send phishing emails to creators, posing as sponsors but attaching malware. Others hijack popular ...

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims The post Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims appeared first on Security Boulevard.

Phishing emails delivering infostealers surge 84%

Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM. Researchers observed an 84% increase in emails delivering infostealers in ...

Skyhawk Security enhances Autonomous Purple Team to secure custom cloud apps

Skyhawk Security expanded its AI-powered Autonomous Purple Team to include custom cloud applications. For the first time, organizations can preemptively and continuously secure custom cloud applications and their cloud infrastructure without ...

Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends

The 2025 Verizon Data Breach Investigations Report (DBIR) reveals that vulnerability exploitation was present in 20% of breaches — a 34% increase year-over-year. To support the report, Tenable Research contributed enriched data on the most ...

Cybersecurity jobs available right now: April 23, 2025

Application Security Analyst Greenway Health | India | Remote – View job details As an Application Security Analyst, you will conduct regular security assessments of applications, including static and dynamic analysis, to identify ...

CISA BOD 25-01 Compliance: What U.S. Government Agencies Need to Know

U.S. government agencies are required to bring their Microsoft 365 cloud services into compliance with a recent Binding Operational Directive. Here’s how Tenable can help. Overview Malicious threat actors are constantly targeting cloud ...

Cloud-Native Security: Assurance for Tech Leaders

Why Should Tech Leaders Place Their Trust in Cloud-Native Security? Let’s ask another question: What better assurance for tech leaders than a robust system that offers comprehensive end-to-end protection? This is precisely what cloud-native ...

Driving Innovation through Secure NHI Lifecycle Management

How Can Secure NHI Lifecycle Management Drive Innovation? Do we ever ponder the security of our machine identities? This question becomes increasingly pertinent as more organizations rely on cloud-based platforms for their operations. These are ...

Secrets Management Solutions That Fit Your Budget

How Can Budget-Friendly Secrets Management Boost Your Cybersecurity Strategy? Navigating vast of cybersecurity can often seem like attempting to solve an intricate puzzle. One key piece that often gets overlooked is the management of Non-Human ...

Travel Sector: Stay Confident with NHI Management

Is Your Travel Sector Business Harnessing the Power of NHI Management? Every industry faces its unique set of challenges when it comes to guaranteeing cybersecurity. However, the travel sector, with its immense data volumes and complex, ...

The Evolution of Vulnerability Management with Steve Carter

Steve Carter discusses the evolution of the vulnerability management market, as well as where vulnerability management has failed and why the next phase has to center around automation and scale. The problem, as Carter sees it, is deceptively ...

Actionable Protection Strategies for 2025 with Shrav Mehta

Shrav Mehta explores lessons from 2024’s costliest data breaches and provides actionable protection strategies for 2025. This discussion examines the current cybersecurity landscape and demonstrates how Secureframe helps organizations navigate ...