Application Security News and Articles


In Other News: Apple Improving Malware Detection, Cybersecurity Funding, Cyber Command Chief Fired

Noteworthy stories that might have slipped under the radar: Apple adding TCC events to Endpoint Security, cybersecurity funding report for Q1 2025, Trump fires the head of NSA and Cyber Command. The post In Other News: Apple Improving Malware ...

Key Findings From Kaseya’s 2025 Global MSP Benchmark Report

Discover key insights from the 2025 Global MSP Benchmark report, including trends in cybersecurity, co-managed IT, M&A strategies and operational efficiency. The post Key Findings From Kaseya’s 2025 Global MSP Benchmark Report appeared ...

When AI Agents Start Whispering: The Double-Edged Sword of Autonomous Agent Communication

AI agents develop their own communication channels beyond our monitoring frameworks, we face a pivotal challenge: harnessing their collaborative problem-solving potential while preventing security breaches and compliance violations that could ...

BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

Discover how BSidesSD 2025 challenged traditional GRC, spotlighted data poisoning, and promoted human-driven security insights. Read our highlights from this community event. The post BSides San Diego 2025: Shifting the Risk Conversation By The ...

News alert: YRIKKA’s ‘Red Teaming’ API advances AI safety, reliability in high-stakes applications

New York, NY, Apr. 3, 2025 — YRIKKA has released the first publicly available API for agentic red teaming of Visual AI assets. This release comes at the heels of YRIKKA successfully raising its pre-seed funding round of $1.5M led … (more…) ...

Design, implement, and deploy application protection policies with Cursor Agent | Impart Security

Introducing Impart + Cursor: Truly Autonomous Application Protection Runtime Security Without the Babysitting Security teams can now define application protection policies declaratively in Impart — with Cursor's agent executing them safely and ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat

CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has been around for two decades but has seen a resurgence in ...

Cybersecurity Snapshot: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security techniques. In addition, CISA and other cyber agencies warn that attackers ...

State Bar of Texas Says Personal Information Stolen in Ransomware Attack

The State Bar of Texas is notifying thousands of individuals that their personal information was stolen in a February ransomware attack. The post State Bar of Texas Says Personal Information Stolen in Ransomware Attack appeared first on SecurityWeek.

US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations

US and allied countries warn of threat actors using the “fast flux” technique to change DNS records and hide malicious servers’ locations. The post US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations ...

NetworkMiner 3.0 Released

I am very proud to announce the release of NetworkMiner 3.0 today! This version brings several new protocols as well as user interface improvements to NetworkMiner. We have also made significant changes under the hood, such as altering the ...

Oracle Confirms Cloud Hack

Oracle has confirmed suffering a data breach but the tech giant is apparently trying to downplay the impact of the incident. The post Oracle Confirms Cloud Hack appeared first on SecurityWeek.

Critical Apache Parquet Vulnerability Leads to Remote Code Execution

A critical vulnerability in Apache Parquet can be exploited to execute arbitrary code remotely, leading to complete system compromise. The post Critical Apache Parquet Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek.

Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack

Evidence shows a SpotBugs token compromised in December 2024 was used in the March 2025 GitHub Actions supply chain attack. The post Compromised SpotBugs Token Led to GitHub Actions Supply Chain Hack appeared first on SecurityWeek.

Beyond SAST: Building a Multi-LLM Judge for Context-Aware Security Analysis

During my years in security engineering, I’ve watched teams struggle with the same problem: drowning in false positives from SAST tools…Continue reading on Medium »

The Ultimate Guide to Vulnerability Assessment

Vulnerability assessment is a process that identifies security weaknesses of any IT system, network, application, or cloud environment. It is a proactive approach to detect and fix security gaps before... The post The Ultimate Guide to ...

Why is Cloud Security Audit Important for Businesses?

Cloud security audit is essential to protect cloud-hosted applications and data from unauthorized access and theft. While cloud providers offer businesses the advantage of hosting apps and data with ease, this flexibility comes with security ...

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft

Microsoft is continuing to build on their AI cybersecurity strategy and this month announced the introduction of new agents in Microsoft Security Copilot. They are introducing agents for phishing triage, alert triage for data loss prevention and ...

Forward-thinking CISOs are shining a light on shadow IT

In this Help Net Security interview, Curtis Simpson, CISO and Chief Advocacy Officer at Armis, discusses how CISOs can balance security and innovation while managing the risks of shadow IT. Rather than focusing on restrictive policies, fostering ...

Connected cars drive into a cybersecurity crisis

Technology has entered all areas of life, and our cars are no exception. They have become computers on wheels, equipped with sensors, software, and connectivity that provide safety and comfort. However, like all technological innovations, this ...