Application Security News and Articles


Fostering Innovation with Secure Machine Identities

How Safe Are Your Machine Identities in the Face of Innovation? Innovation is non-negotiable for staying competitive. Yet, how many organizations truly consider the security of their machine identities as they innovate? Non-Human Identities ...

Better Angels of AI Agents

The post Better Angels of AI Agents appeared first on AI Security Automation. The post Better Angels of AI Agents appeared first on Security Boulevard.

Why SOCs Are Turning to Autonomous Security Operations: It’s Time Automation Worked For You

SOCs use D3's Morpheus AI to investigate, triage, and respond in seconds. See how it adds 20-100 analyst equivalents. The post Why SOCs Are Turning to Autonomous Security Operations: It’s Time Automation Worked For You appeared first on D3 ...

USENIX 2025: PEPR ’25 – Panel: How Privacy Engineers Can Shape The Coming Wave Of AI Governance

Moderator, Panelists: Moderator - Zachary Kilhoffer, Dynatrace; Panelists: Hoang Bao, Axon; Masooda Bashir, University of Illinois at Urbana-Champaign; Debra Farber, Lumin Digital; Sarah Lewis Cortes, Netflix and NIST; Akhilesh Srivastava, ...

#RediShell: Redis/Valkey Get ‘Perfect 10’ Critical RCE Vuln

Redis hell: CVSS 10.0 vulnerability in ubiquitous cloud storage layer. PATCH NOW. The post #RediShell: Redis/Valkey Get ‘Perfect 10’ Critical RCE Vuln appeared first on Security Boulevard.

SpamGPT – When Phishing Gets a Marketing Degree

Cybercriminals just got their own HubSpot (for less than the price of a used car). The post SpamGPT – When Phishing Gets a Marketing Degree appeared first on Security Boulevard.

5 Everyday Workflows That Add Business Risk & How to Secure Them

The post 5 Everyday Workflows That Add Business Risk & How to Secure Them appeared first on Votiro. The post 5 Everyday Workflows That Add Business Risk & How to Secure Them appeared first on Security Boulevard.

Commvault Adds Ability to Recover Iceberg Data Lake Tables

Commvault has added an offering to its data protection portfolio specifically designed to backup and restore the Iceberg table structures that are at the foundation of many of the data lakes that are now being more widely deployed in enterprise ...

A Breach Ready Software-defined Vehicle Program is the Next New Normal for the Automotive Industry

The Tata Motors share price is beginning to go up after its UK subsidiary, Jaguar Land Rover (JLR), announced progress in restoring digital systems that were hit by a cyberattack earlier this month. In the gleaming assembly halls of Solihull and ...

How AI and Vibe Coding Are Changing the Rules of Software Security

Software development is evolving at an unprecedented pace. Today's developers do far more than simply write lines of code. The post How AI and Vibe Coding Are Changing the Rules of Software Security appeared first on Security Boulevard.

USENIX 2025: PEPR ’25 – Building Privacy Products: Field Notes

Creator, Author and Presenter: Miguel Guevara, Google Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ...

Jaguar Land Rover: Production Halted Post-Hack

In a recent podcast interview with Cybercrime Magazine host, David Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, covers the recent Jaguar Land Rover hack, the following production halt, ...

INE Security Releases Industry Benchmark Report: “Wired Together: The Case for Cross-Training in Networking and Cybersecurity”

Raleigh, United States, 7th October 2025, CyberNewsWire The post INE Security Releases Industry Benchmark Report: “Wired Together: The Case for Cross-Training in Networking and Cybersecurity” appeared first on Security Boulevard.

The Vision Behind Mend.io’s Recognition

Mend.io named Visionary in 2025 Gartner® Magic Quadrant™ for AST The post The Vision Behind Mend.io’s Recognition appeared first on Security Boulevard.

Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844)

Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a critical vulnerability (CVE-2025-49844) that may allow attackers full access to the underlying host system. “This flaw ...

Beyond Chatbots: Why Agent Security Is the Industry’s Next Major Challenge

The Shift from Answering Questions to Taking Action AI systems are evolving beyond conversation. Today’s autonomous agents book flights, manage calendars, and execute business workflows without constant human oversight. This represents a ...

Hackers Stole Data From Public Safety Comms Firm BK Technologies

BK Technologies has informed the SEC that it discovered an IT intrusion on September 20.  The post Hackers Stole Data From Public Safety Comms Firm BK Technologies appeared first on SecurityWeek.

Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep

Cloud security teams are often blind to one of the biggest threats to cloud environments: a web of over-privileged identities that create pathways for attackers. Learn how to regain control of your cloud identities by automating the enforcement ...

Announcing SonarQube MCP Server

AI is transforming software development and turbocharging many aspects of a developer's daily work. But it’s also bringing new challenges to your teams: how do you maintain code quality and security standards as the volume of AI-generated code ...

Barracuda Research centralizes AI-driven threat intelligence and incident analysis

Barracuda Networks has introduced Barracuda Research, a new centralized resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. Barracuda Research is designed to equip IT and ...