Application Security News and Articles


How MCP in SaaS Security Helps You Outrun SaaS and AI Risks

Outrun threats with MCP in SaaS security. See how GripMCP's speed, automation, and GenAI guardrails turn SaaS risk from a chase into controlled remediation. The post How MCP in SaaS Security Helps You Outrun SaaS and AI Risks appeared first on ...

Halo Security Enhances Platform with Custom Dashboards and Reports

Miami, United States, 28th August 2025, CyberNewsWire The post Halo Security Enhances Platform with Custom Dashboards and Reports appeared first on Security Boulevard.

BSidesSF 2025: Enhancing Secret Detection In Cybersecurity With Small LMs

Creators, Authors and Presenters: Danny Lazarev, Erez Harush Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

New York Attorney General Sues Zelle Parent Over Fraud Failures, Raising Stakes for Real-Time Payment Security

New York AG Letitia James has sued Zelle’s parent, Early Warning Services, over billions lost to fraud, spotlighting the urgent need for stronger safeguards, consumer protections, and risk quantification in real-time payments. The post New York ...

China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years

China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach. The post China’s Salt Typhoon ...

Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33

Palo Alto, California, 28th August 2025, CyberNewsWire The post Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33 appeared first on Security Boulevard.

Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations

Cybercriminals have started “vibe hacking” with AI’s help, AI startup Anthropic has shared in a report released on Wednesday. An attacker used the agentic AI coding assistant Claude Code for nearly all steps of a data extortion ...

Cybersecurity Models For K-12 School Districts

Cybersecurity models are structured frameworks that educational institutions reference to contain and mitigate cyberthreats. These models range in scope, from basic confidentiality guidelines to full-scale, multi-layered frameworks. Most are ...

CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry

CrowdStrike says the acquisition will bring valuable technology to enhance its Falcon Next-Gen SIEM. The post CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry appeared first on SecurityWeek.

Establishing DevSecOps for Small and Medium Organizations: Practical Controls, Challenges, and…

By Arvind Chauhan, Lead Consultant (Cyber Risk Services) at Secnuo.Continue reading on The AppSec Journal »

Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates

Join this live discussion to learn how organizations can strengthen ransomware defenses while staying ahead of tightening compliance requirements. The post Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates appeared first ...

The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your ...

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain ...

What You Don’t Log Will Hurt You – FireTail Blog

Aug 28, 2025 - Lina Romero - APIs have become the most targeted attack surface in enterprise environments, and AI (particularly agentic AI) is making it even harder to protect those critical connections. But one of the most often overlooked and ...

Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows

Get a firsthand look at how 400 security and IT leaders are tackling today’s cyber risk challenges in this latest study from Tenable and Enterprise Strategy Group. From budget allocation and prioritization methods to team structure, ...

FBI Issues Updated Warning on Salt Typhoon’s Global Cyber-Espionage Operations

The FBI has released new findings on a long-running cyber campaign that quietly infiltrated major U.S. telecommunications providers and critical infrastructure around the world. The campaign, carried out by a group of hackers linked to the ...

Can We Really Eliminate Human Error in Cybersecurity? 

Cybersecurity breaches often stem not from advanced exploits but from human error, misconfigurations, and routine mistakes. True resilience comes from designing systems that expect failure, leverage automation wisely, and foster a security-first ...

What’s the difference between CMC and VMC certification?

Common Mark Certificates (CMC) and Verified Mark Certificates (VMC) both enable brand logos in email inboxes via BIMI, boosting trust, security, and deliverability. The key difference? VMCs require trademark validation and show a blue checkmark ...

Why Traditional Zero-Trust Breaks Down with Agentic Identities

As AI agents become the new digital workforce, traditional zero-trust models fall short. Enterprises face an Access-Trust Gap that demands new runtime governance. Agentic Identity and Security Platforms (AISP) provide dynamic controls to secure ...

Cycuity Radix-ST identifies security weaknesses earlier in chip design

Cycuity introduces Radix-ST, a new product in its Radix portfolio of security solutions designed to leverage static analysis techniques to identify potential weaknesses early in the design cycle without requiring simulation or emulation. As ...