Application Security News and Articles


AdaCore and CodeSecure Merge to Form a Global Company Providing Embedded Software Security and Safety Solutions

[New York, US, 06/18/25] AdaCore, which provides software development tools for mission-critical systems, and embedded software security company CodeSecure, today announced a definitive merger agreement. The merger creates a unified company ...

Chrome 137 Update Patches High-Severity Vulnerabilities

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek.

The Hidden Dangers of AI Copilots and How to Strengthen Security and Compliance 

Now is the time for IT leaders to enforce AI security policies and ensure that generative AI is leveraged safely and responsibly.  The post The Hidden Dangers of AI Copilots and How to Strengthen Security and Compliance  appeared first on ...

Why AI Agents are the Secret to a Proactive Cybersecurity Defense

To level the playing field, enterprise security teams must begin to use AI — especially AI agents — to augment their existing human talent. The post Why AI Agents are the Secret to a Proactive Cybersecurity Defense appeared first on ...

DMARC MSP Case Study: How Primary Tech Simplified Client Domain Security with PowerDMARC

UK-based MSP Primary Tech simplified domain security for multiple client domains by partnering with PowerDMARC. Read their full success story! The post DMARC MSP Case Study: How Primary Tech Simplified Client Domain Security with PowerDMARC ...

Can Deepfakes Fool Your HR or IT Teams? What Every Remote-First Company Must Know in 2025

In 2025, the person you just hired might not be a person at all. Sounds dramatic? It’s not. Deepfakes have officially entered the corporate chat...Read More The post Can Deepfakes Fool Your HR or IT Teams? What Every Remote-First Company Must ...

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution. The post Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products appeared first on SecurityWeek.

Out of Juice? TSA Says Don’t Plug Into Airport USB Ports 

Phone low on charge at the airport? Don't be tempted to use a public USB to recharge, according to the TSA - beware of "juice-jacking." The post Out of Juice? TSA Says Don’t Plug Into Airport USB Ports  appeared first on Security Boulevard.

Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource. The post Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People appeared first on SecurityWeek.

Boost Your Cyber Defense with NSFOCUS Integrated Threat Intelligence (NTI)

In today’s rapidly evolving cybersecurity landscape, staying ahead of threats is not just a challenge, it’s a necessity. At NSFOCUS, we are committed to providing users with the most advanced and comprehensive threat intelligence solutions to ...

Dashlane’s AI model alerts businesses to phishing risks

Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting user credentials. Trained by Dashlane on both legitimate and phishing sources, the new innovation ...

Kusari Inspector improves supply chain security

Kusari unveiled Kusari Inspector, an AI-based pull request security tool that brings cutting-edge security risk analysis directly into developers’ daily workflows. In Kusari Inspector, Kusari has brought together a powerful combination of ...

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security

As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF, when utilized by the graduated CNCF Cilium and its sub-project Tetragon, combined with Software Bills of ...

35 open-source security tools to power your red team, SOC, and cloud security

This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability scanning, and cloud security. Autorize: Burp Suite extension for automatic ...

AI is changing cybersecurity roles, and entry-level jobs are at risk

Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging AI to improve threat detection and response times and to build enhanced incident response capabilities. What’s changing AI ...

Immunity Evasion: Defeating Security with Active Measures & Long-Lived Domains

In Q1 2025, Cofense Intelligence identified a sophisticated phishing tactic combining long-lived domains, custom CAPTCHAs, and anti-automated analysis to bypass SEGs. This combination allows threat actors to evade detection by replacing malicious ...

From cleaners to creepers: The risk of mobile privilege escalation

In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to sensitive data and system functions. Drawing on Zimperium’s recent ...

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according to GoTo. In fact, 62% believe AI has been significantly overhyped. However, this is ...

Beyond Playbooks and AI Agents: Embracing Persistent, Autonomous Security Operations

Why traditional SOC playbooks and AI agents fall short. Learn how Morpheus AI delivers autonomous security operations without the complexity. The post Beyond Playbooks and AI Agents: Embracing Persistent, Autonomous Security Operations appeared ...

MY TAKE: Microsoft takes ownership of AI risk — Google, Meta, Amazon, OpenAI look the other way

Last week at Microsoft Build, Azure CTO Mark Russinovich made headlines by telling the truth. Related: A basis for AI optimism In a rare moment of public candor from a Big Tech executive, Russinovich warned that current AI ...