Application Security News and Articles


AI Tools Transforming Business Operations in 2025

The AI revolution has reached a critical turning point, with 78% of organizations now using AI in at least one business function. This comprehensive guide examines the most impactful AI tools reshaping business in 2025, featuring emerging ...

NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO

NASA needs to perform an agency-wide cybersecurity risk assessment and to complete important cybersecurity tasks for each of its projects. The post NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO appeared first on SecurityWeek.

Sysdig Extends AI Agent Reach Across Portfolio

Sysdig has fully integrated an artificial intelligence (AI) agent across its cloud native application protection platform (CNAPP) to both identify and explain threats, along with remediation suggestions. The post Sysdig Extends AI Agent Reach ...

June Recap: New AWS Services and Privileged Permissions

As June 2025 wraps up, we’re back with another monthly roundup of AWS privileged permission changes and service updates that could reshape your cloud security posture. Each month brings a wave of new permissions — and with them, potential ...

Top 5 High-Risk CVEs of June 2025

Each month brings a flood of vulnerability disclosures. But only a few truly matter. The ones being exploited. The ones buried in critical systems. The ones that could take down... The post Top 5 High-Risk CVEs of June 2025 appeared first on ...

The Best Email Security Companies: Rankings and Reviews

The Best Email Security Companies: Rankings and Reviews Choosing an email security provider shouldn’t be this complicated. The market for email security vendors can be overwhelming. We get it. You’ve got AI-driven platforms, secure email ...

Why Supply Chain Security Is The First Line of Defense

In the modern enterprise IT world, lines between physical and digital are blurry at best. Remote work, BYOD, and even highly-connected offices have redefined what “edge” really means. This also means that the attack surface for your ...

More Support for Complex Authentication Flows: TOTP MFA and Text-Based CAPTCHA

Escape’s new support for TOTP MFA and text-based CAPTCHA enables fully automated DAST on protected apps, reducing scan failures The post More Support for Complex Authentication Flows: TOTP MFA and Text-Based CAPTCHA appeared first on Security ...

How to Chart an Exposure Management Leadership Path for You, Your Boss and Your Organization

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we share some tips on how to lead the move to exposure ...

CitrixBleed 2 might be actively exploited (CVE-2025-5777)

While Citrix has observed some instances where CVE-2025-6543 has been exploited on vulnerable NetScaler networking appliances, the company still says that they don’t have evidence of exploitation for CVE-2025-5349 or CVE-2025-5777, both of ...

Meet Legit MCP: AI-Powered Security That Works Where Your Team Works

Get details on the newly released Legit MCP Server. The post Meet Legit MCP: AI-Powered Security That Works Where Your Team Works appeared first on Security Boulevard.

Hacker Conversations: Rachel Tobac and the Art of Social Engineering

Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do. The post Hacker Conversations: Rachel Tobac and the Art of Social Engineering appeared first on ...

Cato Networks raises $359 million to redefine enterprise security

Cato Networks has raised $359 million in a late-stage funding round, bringing its total valuation to $4.8 billion. The company, which provides a secure networking platform built entirely in the cloud, says the money will support its product ...

Russian Throttling of Cloudflare ‘Renders Many Websites Barely Usable’

Russian ISPs, under the direction of the government, are choking the access of Russian citizens to websites protected by Cloudflare, limiting them to 16 KB of data, which the U.S.-based company said makes the sites "barely usable." The post ...

Casie Antalis Named Executive Director of CISA

Casie Antalis is the new executive director of the Cybersecurity and Infrastructure Security Agency after the departure of Bridget Bean. The post Casie Antalis Named Executive Director of CISA appeared first on SecurityWeek.

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks. The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek.

What is OTP Authentication? A Simple Guide

Introduction Let’s be honest — passwords are kind of a pain. We’re told to create long, complicated ones with numbers, […] The post What is OTP Authentication? A Simple Guide appeared first on Security Boulevard.

Canada Gives Hikvision the Boot on National Security Grounds

Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities. The post Canada Gives Hikvision the Boot on National Security Grounds appeared first on ...

RIFT: New open-source tool from Microsoft helps analyze Rust malware

Microsoft’s Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries. While Rust is becoming more popular for its speed and memory safety, those same qualities make ...

Patrick Ware Named Executive Director of US Cyber Command

The NSA’s Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski. The post Patrick Ware Named Executive Director of US Cyber Command appeared first on SecurityWeek.