Application Security News and Articles


Veza Extends Reach to Secure and Govern AI Agents

Veza has added a platform to its portfolio that is specifically designed to secure and govern artificial intelligence (AI) agents that might soon be strewn across the enterprise. Currently in the process of being acquired by ServiceNow, the ...

From Open Source to OpenAI: The Evolution of Third-Party Risk

From open source libraries to AI-powered coding assistants, speed-driven development is introducing new third-party risks that threat actors are increasingly exploiting. The post From Open Source to OpenAI: The Evolution of Third-Party Risk ...

How test data generators support compliance and data privacy

Whether you’re generating data from scratch or transforming sensitive production data, performant test data generators are critical tools for achieving compliance in development workflows. The post How test data generators support compliance ...

Can a Transparent Piece of Plastic Win the Invisible War on Your Identity?

Identity systems hold modern life together, yet we barely notice them until they fail. Every time someone starts a new job, crosses a border, or walks into a secure building, an official must answer one deceptively simple question: Is this person ...

Communicating AI Risk to the Board With Confidence | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Communicating AI Risk to the Board With Confidence | Kovrr appeared first on Security Boulevard.

StackHawk adds Business Logic Testing (BLT) to its AppSec platform menu

StackHawk is adding Business Logic Testing (BLT) to its AppSec offerings. StackHawk’s BLT automates the detection of critical authorization flaws that account for 34% of security breaches. Business logic flaws, such as broken object level ...

CISO Communities – Cybersecurity’s Secret Weapon

Closed CISO communities act as an information exchange, advice center, pressure valve, and safe haven from critical oversight. The post CISO Communities – Cybersecurity’s Secret Weapon appeared first on SecurityWeek.

700,000 Records Compromised in Askul Ransomware Attack

The e-commerce and logistics company was targeted by the RansomHouse ransomware group in October.  The post 700,000 Records Compromised in Askul Ransomware Attack appeared first on SecurityWeek.

Real Attacks of the Week: How Spyware Beaconing and Exploit Probing Are Shaping Modern Intrusions

Over the past week, enterprise security teams observed a combination of covert malware communication attempts and aggressive probing of publicly exposed infrastructure. These incidents, detected across firewall and endpoint security layers, ...

Echo Raises $35 Million in Series A Funding

The fresh investment comes less than six months after the startup’s seed funding announcement. The post Echo Raises $35 Million in Series A Funding appeared first on SecurityWeek.

Extracting the How: Scaling Adversary Procedures Intelligence with AI

Labeling adversary activity with ATT&CK techniques is a tried-and-true method for classifying behavior. But it rarely tells defenders how those behaviors are executed in real environments. The post Extracting the How: Scaling Adversary ...

Verisoul Raises $8.8 Million for Fraud Prevention

The company plans to accelerate product development, scale go-to-market efforts, and hire new talent. The post Verisoul Raises $8.8 Million for Fraud Prevention appeared first on SecurityWeek.

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices. The post Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks appeared ...

European police busts Ukraine scam call centers

Law enforcement agencies from several European countries have arrested twelve persons suspected of being involved in scamming victims across Europe, Eurojust announced today. “The fraudsters used various scams, such as posing as police ...

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026

Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire The post Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 appeared first on Security Boulevard.

Securing the AI Frontier: How API Posture Governance Enables NIST AI RMF Compliance

As organizations accelerate the adoption of Artificial Intelligence, from deploying Large Language Models (LLMs) to integrating autonomous agents and Model Context Protocol (MCP) servers, risk management has transitioned from a theoretical ...

Unified Security for On-Prem, Cloud, and Hybrid Infrastructure: The Seceon Advantage

Breaking Free from Security Silos in the Modern Enterprise Today’s organizations face an unprecedented challenge: securing increasingly complex IT environments that span on-premises data centers, multiple cloud platforms, and hybrid ...

SoundCloud Confirms Security Incident

SoundCloud confirmed today that it experienced a security incident involving unauthorized access to a supporting internal system, resulting in the exposure of certain user data. The company said the incident affected approximately 20 percent of ...

T.H.E. Journal: How Schools Can Reduce Digital Distraction Without Surveillance

This article was originally published in T.H.E. Journal on 12/10/25 by Charlie Sander. Device-based learning is no longer “new,” but many schools still lack a coherent playbook for managing it. Many school districts dashed to adopt 1:1 ...

Chinese Surveillance and AI

New report: “The Party’s AI: How China’s New AI Systems are Reshaping Human Rights.” From a summary article: China is already the world’s largest exporter of AI powered surveillance technology; new surveillance technologies and ...