Application Security News and Articles


Tidal Cyber Launches Threat-Led Defense, Redefining Detection and Defense

Tidal Cyber’s Threat-Led Defense approach is empowering cybersecurity teams to align detection and defense strategies directly to real-world adversary behavior. The post Tidal Cyber Launches Threat-Led Defense, Redefining Detection and Defense ...

ExtraHop helps SOCs connect the dots with identity-driven detection

ExtraHop unveiled new innovations to accelerate incident response, offering an understanding of cyberattacks by linking disparate detections to compromised identities. As threat actors increasingly weaponize user identities to carry out their ...

Cymulate’s new platform turns threat validation into smarter defense

Cymulate announced the new Cymulate Exposure Management Platform, which validates, prioritizes and optimizes the entire security ecosystem – continuously. The new Cymulate platform unifies exposure data and integrates threat validation results ...

Manifest AI Risk turns weeks of model vetting into two clicks

Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance teams secure their AI supply chains. The Manifest Platform is already used by Fortune 500 companies and critical ...

Riverbed rolls out AI-powered tools to find and fix network issues faster

Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to proactively identify and resolve problems in real-time before they escalate into business ...

BSidesSF 2025: Fireproof Your Castle With Risk-First GRC

Creators/Authors/Presenters: Aakash Yadav, Lindsey Pilver Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

New Reveal platform shines a light on post-login identity behavior

Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and ...

Cisco Says User Data Stolen in CRM Hack

Cisco has disclosed a data breach affecting Cisco.com user accounts, including names, email address, and phone numbers. The post Cisco Says User Data Stolen in CRM Hack appeared first on SecurityWeek.

Java24: Go deeper on parsing Java class files and broader with Stream gatherers

Version 24 version introduces several new language features which collectively simplify code, and provide powerful tools for bytecode manipulation and advanced stream processing. The post Java24: Go deeper on parsing Java class files and broader ...

Beyond Anomalies: How Autonomous Threat Hunting Uncovers the Full Attack Story

APIs are essential in today's digital landscape, supporting everything from mobile apps to vital backend systems. As their importance grows, they also become attractive targets for advanced attackers who bypass traditional security methods. These ...

Four Areas CISOs Must Assess Before Being AI Ready

Every CISO must assess their organization's AI readiness from technology and talent to governance and compliance. The post Four Areas CISOs Must Assess Before Being AI Ready appeared first on Security Boulevard.

How Can You Stop SaaS Privilege Escalation Fast with Real-Time Detection & Automatic Containment?

Stop privilege escalation in SaaS apps fast with real-time detection and automatic containment for stronger security. The post How Can You Stop SaaS Privilege Escalation Fast with Real-Time Detection & Automatic Containment? appeared first on ...

Healthcare Under Pressure

There’s no such thing as a routine day in healthcare IT anymore. While clinicians focus on saving lives, cybersecurity teams are fighting their own battles behind the scenes—battles against credential thieves, ransomware disruptions, phishing ...

SEC Cites Falsified Records in Two Recent Settlements with Chief Compliance Officers

Two recent enforcement actions by the U.S. Securities and Exchange Commission (SEC) have drawn renewed attention to the personal liability risks faced by Chief Compliance Officers (CCOs). In both cases, the SEC charged individual CCOs with ...

Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) appeared first on SecurityWeek.

Vibe Coding: When Everyone’s a Developer, Who Secures the Code?

As AI makes software development accessible to all, security teams face a new challenge: protecting applications built by non-developers at unprecedented speed and scale. The post Vibe Coding: When Everyone’s a Developer, Who Secures the Code? ...

Approov Raises $6.7 Million for Mobile App Security

Approov has raised $6.7 million in Series A funding to advance its mobile application and API security solutions. The post Approov Raises $6.7 Million for Mobile App Security appeared first on SecurityWeek.

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Android’s light August 2025 security update resolves an Adreno GPU vulnerability confirmed as exploited in June. The post Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability appeared first on SecurityWeek.

Microsoft Offers $5 Million at Zero Day Quest Hacking Contest

Research demonstrating high-impact cloud and AI security flaws will be rewarded at Microsoft’s Zero Day Quest competition in spring 2026. The post Microsoft Offers $5 Million at Zero Day Quest Hacking Contest appeared first on SecurityWeek.

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Threat actors might be exploiting a zero-day vulnerability in SonicWall firewalls in a fresh wave of ransomware attacks. The post SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation appeared first on SecurityWeek.