Application Security News and Articles


Check Point Enhances Exposure Management with Veriti Acquisition

How Check Point's acquisition of Veriti enhances threat exposure management. Learn about the impact on cybersecurity strategies today! The post Check Point Enhances Exposure Management with Veriti Acquisition appeared first on Security Boulevard.

Apollo MCP Server: Bridging AI Agents and GraphQL APIs

Discover Apollo GraphQL's MCP Server, the gateway to seamless AI integration with existing APIs. Enhance your development process today! The post Apollo MCP Server: Bridging AI Agents and GraphQL APIs appeared first on Security Boulevard.

Mistral Launches Devstral: Open-Source LLM for Coding Agents

Discover Mistral's Devstral, an open-source LLM revolutionizing software engineering automation. Explore its features and download today! The post Mistral Launches Devstral: Open-Source LLM for Coding Agents appeared first on Security Boulevard.

Cerby Raises $40 Million for Identity Automation Platform

Identity security automation platform Cerby has raised $40 million in Series B funding to scale operations. The post Cerby Raises $40 Million for Identity Automation Platform appeared first on SecurityWeek.

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Mandiant warns that a Vietnamese hacking group tracked as UNC6032 is distributing malware via fake AI video generator websites. The post Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites appeared first on SecurityWeek.

PlainID announces Policy Management for Agentic AI

PlainID introduced Policy Management for Agentic AI. Securing the future with a solution that brings identity-aware, policy-based access control to the next generation of AI systems. As organizations adopt AI and LLM-based systems, they are ...

RadiantOne platform enhancements prevent identity-based attacks

Radiant Logic announced its new Identity Observability features as part of the RadiantOne platform. As identity remains the dominant attack vector for cybercriminals, the latest enhancements to the RadiantOne platform deliver real-time visibility ...

How crypto is changing the game for financial scammers

Cryptocurrency has transformed how we save, spend, and invest money. But with this wave of innovation comes a new breed of scams—slick, high-tech, and harder to spot than ever.  The post How crypto is changing the game for financial scammers ...

The latest in phishing scams: stealing your information through fake online forms

Online threats have become increasingly sophisticated, and phishing attacks are no exception. Among the many tactics cybercriminals deploy, developing phishing campaigns by mimicking well-known companies and duplicating their online forms has ...

BalkanID IGA Lite reduces identity risk and ensures compliance

BalkanID has unveiled its self-service Identity Governance and Administration (IGA) Lite Platform, offering flexibility and transparent pricing. Consisting of three streamlined modules: User Access Reviews (UAR) Lite, IAM Risk Analyzer Lite, and ...

OneDrive Gives Web Apps Full Read Access to All Files

Security researchers warn that OneDrive’s file sharing tool may grant third-party web apps access to all your files—not just the one you choose to upload. The post OneDrive Gives Web Apps Full Read Access to All Files appeared first on ...

Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities

Google and Mozilla released patches for Chrome and FireFox to address a total of 21 vulnerabilities between the two browsers, including three rated high severity. The post Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities appeared first ...

Mental Denial of Service: Narrative Malware and the Future of Resilience

Mental denial of service (DOS) is the manipulative content that hijacks the cognitive processing of individuals and institutions. The post Mental Denial of Service: Narrative Malware and the Future of Resilience appeared first on Security Boulevard.

Attackers hit MSP, use its RMM software to deliver ransomware to clients

A threat actor wielding the DragonForce ransomware has compromised an unnamed managed service provider (MSP) and pushed the malware onto its client organizations via SimpleHelp, a legitimate remote monitoring and management (RMM) tool. ...

What are OAuth Grant Types?

Discover the different OAuth grant types, including authorization code, client credentials, and more. Learn how each type works and when to use them for secure API access. The post What are OAuth Grant Types? appeared first on Security Boulevard.

Vulnerabilities in CISA KEV Are Not Equally Critical: Report

New report says organizations should always consider environmental context when assessing the impact of vulnerabilities in CISA KEV catalog. The post Vulnerabilities in CISA KEV Are Not Equally Critical: Report appeared first on SecurityWeek.

The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw

Physicist Neil Johnson explores how fundamental laws of nature could explain why AI sometimes fails—and what to do about it. The post The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw appeared first on ...

$223 Million Stolen in Cetus Protocol Hack

Hackers exploited a vulnerability in Cetus Protocol, a liquidity provider on the SUI blockchain. The post $223 Million Stolen in Cetus Protocol Hack appeared first on SecurityWeek.

NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape

Santa Clara, Calif. May 28, 2025 – Recently, global research and advisory firm Forrester released The Network Analysis and Visibility (NAV) Solutions Landscape, Q2 2025, offering a comprehensive analysis of market dynamics, technology trends, ...

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

Reactive security isn’t just outdated — it’s become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025, I spoke with Derek Manky, ...