Application Security News and Articles


NSFOCUS Monthly APT Insights – August 2025

Regional APT Threat Situation In August 2025, the global threat hunting system of Fuying Lab detected a total of 23 APT attack activities. These activities were primarily concentrated in regions including South Asia, East Asia, Eastern Europe, ...

Salesforce Partners with Google Cloud to Integrate Gemini AI in Multi-Billion Dollar Deal

Discover the transformative partnership between Salesforce and Google Cloud, focusing on AI integration and enhanced CRM capabilities. Learn how this collaborat The post Salesforce Partners with Google Cloud to Integrate Gemini AI in ...

South Korea Personal Information Privacy Act

What is the Data Privacy Act (DPA)? The Philippines Data Privacy Act of 2012 (Republic Act No. 10173), commonly referred to as the DPA, is the country’s primary data protection law. Enacted in August 2012, the Act was designed to safeguard the ...

Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard 

The BianLian ransomware group took credit for the cyberattack on the healthcare organization in January 2025.  The post Nearly 250,000 Impacted by Data Breach at Medical Associates of Brevard  appeared first on SecurityWeek.

Gurucul’s AI-IRM accelerates insider risk detection

Gurucul released its AI Insider Risk Management (AI-IRM) product, which extends autonomous triage, bias-free risk scoring, context-rich investigation, and human-AI collaboration to automate response workflows directly within insider risk ...

Stealth in Plain Sight: Cryptojackers Hijack PowerShell and Windows Processes to Evade Detection

Darktrace researchers uncovered a sophisticated cryptojacking attempt using PowerShell scripts to inject NBMiner into Windows processes. Experts warn that modern cryptomining malware is more than a nuisance—posing risks to productivity, data ...

Israeli Cyber Fund Glilot Capital Raises $500 Million

The top-performing venture fund heavily invests in startups building cybersecurity, AI, and enterprise software. The post Israeli Cyber Fund Glilot Capital Raises $500 Million appeared first on SecurityWeek.

QuProtect R3 provides encryption visibility across systems

QuSecure launched QuProtect R3, an integrated, production-ready PQC platform designed to simplify encryption modernization for everyone. With the platform’s Reconnaissance innovation, a complimentary module for qualified companies, ...

Chrome 140 Update Patches Sixth Zero-Day of 2025

An exploited type confusion in the V8 JavaScript engine tracked as CVE-2025-10585 was found by Google Threat Analysis Group this week. The post Chrome 140 Update Patches Sixth Zero-Day of 2025 appeared first on SecurityWeek.

DruAI Agents and MetaGraph deliver real-time data intelligence

Druva released Dru MetaGraph, a secure, tenant-specific, graph-powered foundation for real-time data intelligence, and two new DruAI Agents: Insights Agent and Lifecycle Agent. Together, these innovations can help customers uncover insights ...

Insight Partners Confirms Data Breach Result of Ransomware Attack

Venture capital firm Insight Partners says the data breach disclosed in February 2025 impacts over 12,000 people. The post Insight Partners Confirms Data Breach Result of Ransomware Attack appeared first on SecurityWeek.

Catchpoint improves monitoring posture with AI capabilities

Catchpoint released two AI-powered capabilities designed to simplify digital resilience for critical applications: Catchpoint Root Cause Analysis (RCA) and Catchpoint Advisor, which improve monitoring posture and bring immediate insights into IT ...

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational downtime. Enterprises with business operations that have been stopped by Windows PCs made inoperable ...

Ping Identity debuts AI framework to keep humans in control

Ping Identity announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every ...

Generative AI use case for Penetration Testing

Generative AI is not just a tool for content creation; it’s rapidly becoming a force multiplier in the world of cybersecurity…Continue reading on Medium »

Generative AI use case for Penetration Testing

Generative AI is not just a tool for content creation; it’s rapidly becoming a force multiplier in the world of cybersecurity…Continue reading on Medium »

Behind the scenes of cURL with its founder: Releases, updates, and security

In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services to IoT. He shares insights into cURL’s decades-long journey of ...

Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm analysts, manual investigations eat up valuable hours from the most expensive ...

AI made crypto scams far more dangerous

The first half of 2025 saw one of the worst waves of crypto hacks to date, with more than $3.01 billion stolen. AI was a big part of it, making scams easier to run and letting even low-skill criminals get in on the action. In the U.S. alone, ...

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025 from IO shows how fast new risks are converging. Drawing on responses from more than 3,000 security professionals ...