Application Security News and Articles


AWS Centralized Product Lifecycle Page: Enhance Transparency & Info

Discover AWS's new Product Lifecycle page for tracking service changes and updates. Stay informed and enhance your cloud strategy today! The post AWS Centralized Product Lifecycle Page: Enhance Transparency & Info appeared first on Security ...

Getting Ahead of AI Risk: What Comes Next for Tenable

The acquisition of Apex Security adds a powerful new layer of visibility, context and control to the Tenable One Exposure Management Platform to govern usage, enforce policy and control exposure across both the AI that organizations use and the ...

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

PALO ALTO, California, 29th May 2025, CyberNewsWire The post Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari appeared first on Security Boulevard.

Unmasking ECH: Why DNS-at-the-Root-of-Trust Holds the Key to Secure Connectivity

Encrypted Client Hello (ECH) has been in the news a lot lately. For some background and relevant and recent content, see: IETF Proposed Standard Cloudflare Blog from 2023 announcing ECH support RSA 2025 talk: ECH: Hello to Enhanced Privacy or ...

Microsoft unveils “centralized” software update tool for Windows

Microsoft is looking to streamline the software updating process for IT admins and users by providing a Windows-native update orchestration platform, and to help organizations upgrade their computer fleet to Windows 11 with the help of Windows ...

Your IT Infrastructure is Hybrid. So Why Not Your Security Model?

A hybrid security model provides the ability to deploy a variety of rule sets for specific applications while providing a single, centralized way to manage it all. The post Your IT Infrastructure is Hybrid. So Why Not Your Security Model? ...

Victoria’s Secret Website Taken Offline After Cyberattack

Website remains offline following suspected cyber incident, as experts warn of escalating threats targeting major retailers The post Victoria’s Secret Website Taken Offline After Cyberattack appeared first on SecurityWeek.

Adidas Data Breach Linked to Third-Party Vendor

Adidas said hackers accessed a “third-party customer service provider” and stole customer information. The post Adidas Data Breach Linked to Third-Party Vendor appeared first on SecurityWeek.

An Enterprise Playbook to Defending Against Volt Typhoon 

An identity threat detection approach built on access intelligence is key to identifying and disrupting campaigns like Volt Typhoon.  The post An Enterprise Playbook to Defending Against Volt Typhoon  appeared first on Security Boulevard.

Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management

Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization. The post Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.

RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector

Executives are under digital siege—and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 Privacy, to unpack a … (more…) The post ...

Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025

Agentic AI can be a great tool for many of the ‘gray area’ tasks that SOC analysts undertake. The post Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 appeared first on SecurityWeek.

AI Agents and APIs: Understand Complexities Today to Authenticate Tomorrow

The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical authentication challenges.  The post AI Agents and ...

Human Risk Management: The Next Security Challenge

Nisos Human Risk Management: The Next Security Challenge Human risk isn’t new. It’s growing faster, showing up in more places, and catching many organizations off guard... The post Human Risk Management: The Next Security Challenge appeared ...

AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis 

A new report from Varonis examines nearly 10 billion files and suggests that AI is a ticking time bomb for your data. The post AI is a Ticking Time Bomb for Your Data, Reveals New Report From Varonis  appeared first on Security Boulevard.

Model Context Protocol (MCP) vs Agent-to-Agent (A2A)

The Future of AI Agent Communication and What It Means for Enterprise Innovation As AI agents move from concept to operational reality, the architecture behind...Read More The post Model Context Protocol (MCP) vs Agent-to-Agent (A2A) appeared ...

Resecurity Compliance Manage empowers cybersecurity leaders with AI-driven insights

Resecurity has officially launched its AI-driven Compliance Manager. The solution is engineered to help CISOs and compliance teams manage complex regulatory demands, reduce risk, and maintain alignment with global cybersecurity standards. The ...

Cisco Duo IAM protects against AI-driven identity threats

Cisco unveiled Duo Identity and Access Management (IAM), a new security solution that transforms how organizations combat persistent identity-based attacks that are accelerating in the AI era. Identity is a prime target for bad actors, accounting ...

What CISOs can learn from the frontlines of fintech cybersecurity

At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security & Resilience for Europe at Mastercard. Our conversation cut through the hype and focused on what CISOs deal with every day: how to embed security into ...

How CISOs can regain ground in the AI fraud war

Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud & AML Executive Report, based on surveys of banks, fintechs, credit unions, and ...