Application Security News and Articles


New MCP server from groundcover redefines LLM observability

A new MCP server, faster than any other on the market, is launching today from groundcover, the eBPF-driven observability platform. Developers can now enhance their AI-driven workflows with deep system context, powered by groundcover’s granular ...

Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next

As cloud security spending surges to $111 billion, new data highlights Microsoft's dominance, the U.S. market's outsized role, and Google's strategic acquisition of Wiz. The post Inside the $111 Billion Cloud Security Market: Acquisition, ...

Vulnerabilities found in NASA’s open source software

Vulnerabilities in open source software developed and used in-house by NASA could be exploited to breach their systems, claims Leon Juranić, security researcher and founder of cybersecurity startup ThreatLeap. The vulnerabilities Juranić, whose ...

How to Stop AI from Scraping Your Website

Learn effective methods to block AI from scraping and using your content from simple robots.txt directives to advanced bot management solutions. The post How to Stop AI from Scraping Your Website appeared first on Security Boulevard.

Detection as code: How to enhance your real-time threat detection

Detection as code (DaC) is a powerful way for security teams to streamline rule development, automate threat detection, and respond to attacks with greater speed and precision. The DaC approach applies formal software development practices to ...

AI in K-12 Cybersecurity: Hype or Helpful?

Not all AI is created equal. Here’s how cybersecurity AI actually helps defend your district. From predictive grading tools to personalized learning platforms, artificial intelligence (AI) is quickly making its mark in K-12 education. But what ...

Software Engineering Certifications Rolling Out Soon

In our last episode, Trace Bannon and Dan Whitliff established the need for certifying critical system software engineers just as we certify engineers in chemical, architectural, mechanical and other safety-critical verticals.  In this show, we ...

Law Firms Warned of Silent Ransom Group Attacks

The FBI warns US law firms that the Silent Ransom Group (SRG) has been constantly targeting the legal industry. The post Law Firms Warned of Silent Ransom Group Attacks appeared first on SecurityWeek.

What is an SSL stripping attack and how to prevent it

SSL stripping is a man-in-the-middle attack that downgrades secure HTTPS connections to HTTP, exposing sensitive user data. This article explains how the attack works and outlines the best technical and strategic measures businesses and users can ...

Coinbase Hit with Lawsuit Over $400M Data Breach and Stock Loss

Coinbase faces a class action lawsuit over a data breach. Learn about the implications for investors and the importance of secure authentication. The post Coinbase Hit with Lawsuit Over $400M Data Breach and Stock Loss appeared first on Security ...

Massive Data Breach Exposes 184 Million Login Credentials

A major data breach exposed 184 million login credentials. Discover the risks and learn how to protect yourself from cyber threats. The post Massive Data Breach Exposes 184 Million Login Credentials appeared first on Security Boulevard.

Why Email Aliases Fail DMARC (And How to Fix Them)

Struggling with DMARC alias failures? Learn why your alias emails get blocked and how to fix SPF&DKIM alignment for better deliverability. The post Why Email Aliases Fail DMARC (And How to Fix Them) appeared first on Security Boulevard.

Why app modernization can leave you less secure

Enterprises typically “modernize” access patterns for an application by enabling industry standard protocols like OIDC or SAML to provide single sign-on (SSO) for legacy apps via a cloud identity provider (IDP). That’s a major step towards ...

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the cybersecurity implications of deploying AI agents in industrial environments. He talks about ...

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data. Recently, more of these schemes have been linked to North Korea. They don’t ...

Azure AI Foundry Agent Service Launches Multi-Agent Orchestration

Azure AI Foundry Agent Service GA launch! Build and manage AI agents seamlessly to enhance enterprise productivity. Learn more today! The post Azure AI Foundry Agent Service Launches Multi-Agent Orchestration appeared first on Security Boulevard.

Google Boosts LiteRT and Gemini Nano for On-Device AI Efficiency

Discover how Google's LiteRT enhances on-device inference with GPU and NPU acceleration, making AI applications faster and more efficient. Learn more! The post Google Boosts LiteRT and Gemini Nano for On-Device AI Efficiency appeared first on ...

Cisco Unveils JARVIS: AI Assistant Transforming Platform Engineering

Discover JARVIS, Cisco's AI assistant that streamlines platform engineering workflows and enhances AI security with ServiceNow. Learn more now! The post Cisco Unveils JARVIS: AI Assistant Transforming Platform Engineering appeared first on ...

AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report

AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report madhav Tue, 05/27/2025 - 04:40 The Thales 2025 Data Threat Report reveals a critical inflection point in global cybersecurity. As the threat ...

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats. 35.5% of all ...