Application Security News and Articles


When trusted AI connections turn hostile

Researchers have revealed a new security blind spot in how LLM applications connect to external systems. Their study shows that malicious Model Context Protocol (MCP) servers can quietly take control of hosts, manipulate LLM behavior, and deceive ...

AI and the Golden Age of Surveillance

AI has ended the age of inefficient surveillance. Explore how automation, data, and machine learning are reshaping privacy, power, and the Fourth Amendment. The post AI and the Golden Age of Surveillance appeared first on Security Boulevard.

Identifying risky candidates: Practical steps for security leaders

Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. ...

Designing Security for Developers, Not Around Them 

GenAI boosts developer productivity—but also risk. Learn how developer-first security embeds data protection early, securing code and AI pipelines from the start. The post Designing Security for Developers, Not Around Them  appeared first on ...

Everyone wants AI, but few are ready to defend it

The rush to deploy AI is reshaping how companies think about risk, according to Cisco. A global study finds that while most organizations are moving quickly to adopt AI, many are not ready for the pressure it puts on their systems and security. A ...

Humanoid robot found vulnerable to Bluetooth hack, data leaks to China

Alias Robotics has published an analysis of the Unitree G1 humanoid robot, concluding that the device can be exploited as a tool for espionage and cyber attacks. A robot that can be hacked through Bluetooth Their tests show that anyone within ...

The password problem we keep pretending to fix

Experts across industries say they are still losing ground against identity-related breaches, even after years of investment in stronger access controls, according to RSA. Many said their organizations had faced at least one identity-related ...

ImmuniWeb Expands discovery with ASM and Dark web packages

On top of several new free tools launched during the summer, ImmuniWeb released over 500 updates, improvements, new features, and integrations across all our products in Q3, including ImmuniWeb On-Demand, ImmuniWeb MobileSuite, ImmuniWeb ...

Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management 

Global sales SVP at Qualys Shawn O’Brien kicked off the company’s Qualys ROCon 2025 event this week in Houston, Texas. Driving straight into an opening keynote to explain what ROCon means today (remember that Qualys traditionally used the ...

Powerful Tools for Managing Machine Identities

What Are Non-Human Identities in Cybersecurity? Machine identities, often referred to as Non-Human Identities (NHIs), have become paramount. But what exactly are NHIs, and why are they crucial? These identities are essentially the digital ...

A View from the C-suite: Aligning AI security to the NIST RMF – FireTail Blog

Oct 15, 2025 - Jeremy Snyder - In 2025, the AI race is surging ahead and the pressure to innovate is intense. For years, the NIST Cybersecurity Framework (CSF) has been our trusted guide for managing risk. It consists of five principles: ...

Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales

Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action  October is Cybersecurity Awareness Month — but awareness alone doesn’t protect your store. ...

Seceon for Finance: Safeguarding the Digital Economy

In today’s hyper-connected economy, financial institutions operate across cloud systems, digital payment networks, and third-party integrations — forming the nerve center of global commerce. But with this connectivity comes unprecedented ...

NDSS 2025 – MADWeb 2025, Session 1: Network Meets The Web

Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing ...

Code Scanning in 2025: Why, How & the Role of Scanning in AI Security

Explore code scanning benefits, tools, and best practices. The post Code Scanning in 2025: Why, How & the Role of Scanning in AI Security appeared first on Security Boulevard.

News Alert: MCPTotal unveils the first platform to secure Model Context Protocol workflows

NEW YORK, Oct. 15, 2025, CyberNewswire — MCPTotal, a comprehensive secure Model Context Protocol (MCP) platform, today announced its flagship platform to help businesses adopt and secure MCP servers. MCP has become the standard interface fxor ...

Randall Munroe’s XKCD ‘’Hiking”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Hiking” appeared first on Security Boulevard.

SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta

Premier industrial cybersecurity conference Offers 70+ sessions, five training courses, and and ICS Village CTF competition. The post SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta appeared first on SecurityWeek.

HYPR Delivers the First True Enterprise Passkey for Microsoft Entra ID

For years, the promise of a truly passwordless enterprise has felt just out of reach. We’ve had passwordless for web apps, but the desktop remained a stubborn holdout. We’ve seen the consumer world embrace passkeys, but the solutions were ...

F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info

US tech company F5 has suffered a breach, and the attackers made off with source code of and vulnerability information related to its BIG-IP family of networking and security products, the company confirmed today. BIG-IP vulnerabilities are often ...