Application Security News and Articles


Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats. The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense ...

Google Says Android pKVM Earns Highest Level of Security Assurance

Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers. The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek.

AI Threats & Adaptive Authentication: How to Be Protected Against Deepfakes and Credential Attacks

Learn how adaptive authentication defends against deepfakes, credential attacks, and AI threats to keep your business secure. The post AI Threats & Adaptive Authentication: How to Be Protected Against Deepfakes and Credential Attacks appeared ...

Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products

Rockwell Automation has published several advisories describing critical and high-severity vulnerabilities affecting its products. The post Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products appeared first on ...

Cisco Patches Critical Vulnerability in Firewall Management Platform

Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products. The post Cisco Patches Critical Vulnerability in Firewall Management Platform appeared first on SecurityWeek.

SquareX at Black Hat and DEF CON: Bring Our Browser Security Research to the World

SquareX at Black Hat and DEF CON: Bringing Our Browser Security Research to the World Team SquareX Takes on Hacker Summer Camp in 2025 With the twin events of Black Hat USA and DEF CON 33, Las Vegas transformed into the cybersecurity capital ...

How I Started Securing My Crypto Accounts with OTP Verification

Learn how OTP verification and unified APIs protect your crypto accounts from hackers while keeping login simple and hassle-free. The post How I Started Securing My Crypto Accounts with OTP Verification appeared first on Security Boulevard.

How military leadership prepares veterans for cybersecurity success

In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in ...

Cyber insurance market shows early signs of maturity

The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. Brokers and carriers are taking on different but connected roles to help customers get policies. ...

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with real-world systems. ...

Fighting fraud with AI: The new identity security playbook

In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using generative AI ...

Employees race to build custom AI apps despite security risks

The latest Netskope findings show a 50% increase in GenAI platform usage among enterprise end-users, driven by growing employee demand for tools to develop custom AI applications and agents. Top LLM interfaces by percentage in organizations ...

New infosec products of the week: August 15, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Brivo, Envoy, Prove, Rubrik, and Trellix. Rubrik Agent Rewind enables organizations to undo mistakes made by agentic AI Agent Rewind, powered by ...

The Cost of NYDFS Cybersecurity Noncompliance: What You Need to Know in 2025

The New York State Department of Financial Services (NYDFS) has long been a leader in setting cybersecurity standards for the financial services and insurance sectors. Under 23 NYCRR Part 500, regulated entities are required to implement a ...

Post-Incident CRM Forensics: Why Deploying AppOmni Is a Best Practice

OAuth abuse exposes SaaS data. AppOmni’s threat detection and security posture management shut it down. The post Post-Incident CRM Forensics: Why Deploying AppOmni Is a Best Practice appeared first on AppOmni. The post Post-Incident CRM ...

Adapting to New Cloud Security Challenges

Are Organizations Truly Prepared for New Cloud Security Challenges? With businesses increasingly shift to cloud-based infrastructures, the question lingers: are organizations genuinely adapting to emerging cloud security challenges? The rise of ...

Boosting Independence with Advanced Secrets Scanning

Is Your Organization Truly Independent in Terms of Security? A sense of independence can often be elusive for organizations expressing intent to have complete control over their cybersecurity. To achieve this, businesses must consider an ...

BSidesSF 2025: Don’t Trust, Verify! – How I Found A CSRF Bug Hiding In Plain Sight

Creator, Author and Presenter: Patrick O'Doherty Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Act Surprised: Data Brokers Seem to Scoff at California Privacy Act

Privacy Rights Crushed by robots.txt: Sen. Hassan is on the warpath. The post Act Surprised: Data Brokers Seem to Scoff at California Privacy Act appeared first on Security Boulevard.

The Vulnerability Multiverse: Only Proactive Training Can Keep It Together

In a world where code moves faster than ever and threat actors adapt in milliseconds, securing software can feel like navigating a multiverse of possible failures. One path leads to clean, secure releases. Another leads to breach headlines. And ...