Application Security News and Articles


Lion Safe-Zone

Hat Tip to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending this highly entertaining security comic! Original H/T to the original post ...

Google adds Emerging Threats Center to speed detection and response

When a new vulnerability hits the news, security teams often scramble to find out if they are at risk. The process of answering that question can take days or weeks, involving manual research, rule-writing, and testing. Google Security Operations ...

China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

NTT’s chief cybersecurity strategist Mihoko Matsubara on the new geopolitics of hacking, the "chicken and egg" problem of 5G, and the AGI threat to society. The post China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief ...

UK’s new Cyber Security and Resilience Bill targets weak links in critical services

The UK government has introduced the Cyber Security and Resilience Bill, a major piece of legislation designed to boost the country’s protection against cyber threats. The new law aims to strengthen the digital defenses of essential public ...

NDSS 2025 – MALintent: Coverage Guided Intent Fuzzing Framework For Android

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel (University of California, Santa Barbara), Giovanni ...

How TTP-based Defenses Outperform Traditional IoC Hunting

Behavioral detection allows defenders to recognize activity patterns like privilege escalation, credential theft, and lateral movement—often ahead of encryption or data exfiltration. The post How TTP-based Defenses Outperform Traditional IoC ...

Commvault Extends AI Ability to Ensure Cyber Resilience

Commvault today extended the reach and scope of its data protection portfolio as part of an effort to enable IT organizations to achieve and maintain resiliency. Announced at its SHIFT 2025 event, these additions are part of a Commvault Cloud ...

Securonix DPM Flex optimizes SIEM data management

Securonix announced of Data Pipeline Manager (DPM) with DPM Flex Consumption, a breakthrough in integrated SIEM data management that expands threat visibility, increases analytical coverage, and improves compliance assurance, all within the same ...

Commvault Cloud Unity platform delivers unified data security, recovery, and identity protection

Commvault has announced the Commvault Cloud Unity platform release. This next-generation, AI-enabled version of Commvault Cloud now unifies data security, cyber recovery, and identity resilience across cloud, SaaS, on-premises, and hybrid ...

Black Duck expands SCA with AI Model Risk Insights to deliver visibility into AI model usage

Black Duck revealed that Black Duck SCA can now identify and analyze AI models, starting with the 2025.10.0 release. This capability addresses the need for enterprises to gain visibility into the usage, licensing and data origins of open source ...

Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 2025 highlighted identity, cloud risk, and detection gaps. Learn why defaults and identity sprawl, not zero-days, are still the greatest security threat. The post Queen City Con 0x3: Hacking And Embracing Resiliency appeared first ...

Stellar Cyber 6.2 strengthens human-augmented autonomous SOC

Stellar Cyber announced version 6.2, marking the next major milestone in its mission to deliver autonomous security operations. Building on the AI and automation foundations established in versions 6.0 and 6.1, Stellar Cyber 6.2 deepens analyst ...

How to Build a Strong Ransomware Defense Strategy for Your Organization?

Ransomware attacks increased by 149% in 2025, within the U.S. alone. Organizations have paid millions in ransom and recovery costs, making ransomware attacks one of the most financially debilitating cyberattacks. To ensure that your organization ...

Cyware enhances cyber defense with AI Fabric merging generative and agentic AI

Cyware has announced the launch of a new Cyware Quarterback AI solution delivering an AI Fabric to address security use cases. Cyware Quarterback AI was initially launched as a Co-pilot chat assistant in March 2024. Since that first release the ...

Credit Union Cybersecurity Crisis 2025: Strategic Analysis & The Seceon Platform Imperative

Executive Summary In 2025, credit unions across the United States stand at the crossroads of survival and collapse in the face of unprecedented cybersecurity challenges. Sophisticated cyber threats, intense regulatory scrutiny, and limited ...

Virtual Event Today: CISO Forum 2025 Virtual Summit

From the evolving role of AI to the realities of cloud risk and governance, the CISO Forum Virtual Summit brings together CISOs, researchers, and innovators to share practical insights and strategies. The post Virtual Event Today: CISO Forum 2025 ...

Intel Sues Ex-Employee It Claims Stole 18,000 Company Files

Intel is suing a former employee who the chipmaker claims downloaded almost 18,000 corporate files days before leaving the company. The software engineer was told he was being let go effective July 31, likely part of Intel's larger effort to shed ...

Sweet Security Raises $75 Million for Cloud and AI Security

The cybersecurity startup will use the investment to accelerate global expansion and product innovation. The post Sweet Security Raises $75 Million for Cloud and AI Security appeared first on SecurityWeek.

Aryaka advances converged networking and security with Unified SASE as a Service 2.0

Aryaka has announced the launch of Aryaka Unified SASE as a Service 2.0. The new platform incorporates several major new features to accommodate rising AI adoption and the need to secure the hybrid workforce. Aryaka Unified SASE 2.0 ensures that ...

Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Google is targeting the threat group known as Smishing Triad, which used over 194,000 malicious domains in a campaign.  The post Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit appeared first on SecurityWeek.