Application Security News and Articles


New infosec products of the week: September 19, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, Catchpoint, Nagomi Security, Neon Cyber, and QuSecure. Absolute Security Rehydrate restores compromised endpoints Rehydrate delivers ...

What Makes an AI Governance Framework Effective?

Key Takeaways Artificial intelligence is being adopted at a remarkable pace. Enterprises now use AI in customer service, fraud detection, logistics, healthcare diagnostics, and dozens of other areas. With this adoption comes a new category of ...

News alert: Palo Alto flags threats that evade Secure Web Gateways — echoing SquareX research

Palo Alto, Calif., Sept. 18, 2025, CyberNewswire: SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year, warning the security community of 20+ attacks that allow attackers to bypass all major SASE/SSE ...

The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It)

SOC automation breaks in the messy middle of triage and investigation. Learn how Morpheus AI fixes it with transparent, adaptive playbooks. The post The Messy Middle: Where SOC Automation Breaks (and How Morpheus AI Fixes It) appeared first on D3 ...

Phishing Attack

Phishing remains one of the most successful cyberattack techniques today. Despite decades of awareness campaigns, it continues to deceive individuals and organizations into giving away sensitive information, from login credentials to financial ...

DEF CON 33: AIxCC With ShellPhish

Creators, Authors and Presenters: Silk Interviews Members ShellPhish Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events ...

“Shai-Hulud” npm Attack: What You Need to Know

Get details on this supply chain attack. The post “Shai-Hulud” npm Attack: What You Need to Know appeared first on Security Boulevard.

How the Best Bank Reconciliation Software Simplifies Audits and Strengthens Compliance

Discover how the best bank reconciliation software simplifies audits, ensures compliance, reduces errors, and strengthens financial transparency. The post How the Best Bank Reconciliation Software Simplifies Audits and Strengthens Compliance ...

Insider Threats and the Power of Just-in-Time Privileged Access 

September marks National Insider Threat Awareness Month, a reminder that some of the biggest security risks to an organization do not come from shadowy external hackers, but from the people already inside the walls. Employees, contractors, and ...

CrowdStrike Aims to Define New Security Model Based on AI Agents 

CrowdStrike unveiled its Falcon Agentic Security Platform at Fal.Con 2025, ushering in the “agentic era of cybersecurity.” With AI-powered agents, unified data governance, and threat intelligence, the platform aims to counter adversaries ...

Day in the Life: Expanding Sonar into LATAM as a Country Manager

Let's dive in and learn about his drive to expand Sonar's presence in Latin America, what a typical day looks like, and what fuels his passion both in and out of the office. The post Day in the Life: Expanding Sonar into LATAM as a Country ...

Continuous Authorization in Action: Dispersive+CrowdStrike Integration

For an extended period, cybersecurity has been characterized by the isolated operation of sophisticated tools. While endpoint protection, identity solutions, and network security each fulfill their respective functions, a critical vulnerability ...

Operationalizing NIST and MITRE with Autonomous SecOps

How Morpheus brings trusted cybersecurity frameworks to life through automation and intelligence. The post Operationalizing NIST and MITRE with Autonomous SecOps appeared first on D3 Security. The post Operationalizing NIST and MITRE with ...

Configuring an MCP Server with Auth0 as the Authorization Server

4 min readA practical walkthrough of the Auth0 settings and tweaks you’ll need to get an MCP server working smoothly with real-world clients like Claude. The post Configuring an MCP Server with Auth0 as the Authorization Server appeared first ...

What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience

Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows ...

The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity 

The post The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity  appeared first on AI Security Automation. The post The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity  appeared first on ...

DEF CON 33: Torvik From Tulip Tree Tech

Creators, Authors and Presenters: Silk, Torvik Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas ...

The Hidden War Above: How GPS Jamming Exposes Our Digital Vulnerabilities

Every day, thousands of flights cross the skies above the Baltic Sea. Pilots expect their GPS systems to guide them safely through busy air corridors, just as they have for decades. But since Russia’s invasion of Ukraine in 2022, something ...

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

OpenAI has fixed this zero-click attack method called by researchers ShadowLeak. The post ChatGPT Deep Research Targeted in Server-Side Data Theft Attack appeared first on SecurityWeek.

SonicWall says attackers compromised some firewall configuration backup files

Between attackers exploiting 0-day and n-day vulnerabilities in the company’s firewalls and Secure Mobile Access appliances, SonicWall and its customers have had a tough year. And, unfortunately for them, the troubles are not over: unknown ...