Application Security News and Articles


Skyhigh Security adds data protection solutions for Microsoft Copilot and ChatGPT Enterprise

Skyhigh Security announced the expansion of its Skyhigh AI offering to include additional data protection solutions for Copilot for Microsoft 365 and ChatGPT Enterprise. This development follows the company’s earlier introduction of Skyhigh ...

AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover

Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction. The post AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover appeared first on SecurityWeek.

Securonix brings autonomous decision-making to security operations

Securonix announced the next phase of Securonix EON, introducing modular GenAI Agents. These specialized, decision-capable agents are designed to perform high-impact jobs to be done (JTBD) across the threat detection, investigation, and response ...

Arkose Labs launches Edge and Scraping Protection to secure enterprise digital borders

Arkose Labs has announced the expansion of its security portfolio with two new offerings: Arkose Edge and Arkose Scraping Protection. These innovations address the growing challenges large enterprises face in securing their complex digital ...

Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities

Chrome 136 and Firefox 138 were released in the stable channel with patches for multiple high-severity vulnerabilities. The post Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Torii launches agentic SaaS Management Platform

Torii unveiled Torii Eko, an agentic SaaS Management Platform, ushering in a new era of AI-powered execution for modern software management. Torii Eko includes three intelligent in-platform agents: Eko Assist, available now; and Eko Insight and ...

Saviynt ISPM provides insights into an organization’s identity and access posture

Saviynt launched AI-powered Identity Security Posture Management (ISPM) as part of its converged Identity Cloud platform. Saviynt’s ISPM provides actionable insights into an organization’s identity and access posture, offering an intelligent ...

Trellix DLP Endpoint Complete prevents data leaks in Windows and macOS

Trellix announced advancements to Trellix DLP Endpoint Complete, available globally in Q2 2025. New offerings and features incorporate intelligent capabilities to enhance Trellix’s data loss prevention (DLP) solutions, enabling customers to ...

Product showcase: Ledger Flex secure crypto wallet

The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it suitable for both beginners and more experienced users. Ledger Flex stores ...

Mobile security is a frontline risk. Are you ready?

The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the ...

Villain: Open-source framework for managing and enhancing reverse shells

Villain is an open-source Stage 0/1 command-and-control (C2) framework designed to manage multiple reverse TCP and HoaxShell-based shells. Beyond simply handling connections, Villain enhances these shells with added functionality, offering ...

Securing the invisible: Supply chain security trends

Adversaries are infiltrating upstream software, hardware, and vendor relationships to quietly compromise downstream targets. Whether it’s a malicious update injected into a CI/CD pipeline, a rogue dependency hidden in open-source code, or ...

Why cyber resilience must be part of every organization’s DNA

As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of ...

The Great E-Scrape: How AI Summaries and Agentic Queries Are Sidelining Your Site

From OTAs to review aggregators to generative AI, new tools are bypassing first-party content. The result is a distorted customer journey and a growing gap in your visibility into user behavior, with clear implications for brand control and ...

JPMorgan Just Made SaaS Security Impossible to Ignore | Grip

Explore the implications of JPMorgan's open letter on SaaS security and how organizations can effectively and proactively address the evolving SaaS risks. The post JPMorgan Just Made SaaS Security Impossible to Ignore | Grip appeared first on ...

News alert: At RSAC 2025, SecAI unveils platform that fuses agentic AI, contextual threat intelligence

San Francisco, Calif., Apr 29, 2025, CyberNewswire — SecAI, an AI-enriched threat intelligence company, made its official debut today at RSA Conference 2025 in San Francisco, marking the company’s first public appearance on the global ...

Choosing the Best Secrets Vault—Are You Free?

Are Your Cloud Security Decisions Truly Yours? Amid the dialing twists and turns of cybersecurity, have you ever wondered whether the freedom to make decisions about your Non-Human Identities (NHIs) and Secrets Security Management is still in ...

Gaining Independence with NHI Lifecycle Management

Can Non-Human Identities Truly Empower Independent Security Systems? Non-Human Identities (NHIs) are becoming an unavoidable part of our cyber defenses. Managing their lifecycle has become an integral aspect of creating independent security ...

Innovative Measures in Cybersecurity for 2025

Are Concerns Over Cloud Security Limiting Your Innovation? The rapid pace of digital transformation has propelled businesses towards adopting new technologies like cloud computing. However, as high-profile data breaches continue to make ...

Feel Relieved with Effective Least Privilege Tactics

Why are Least Privilege Tactics Crucial in the Cybersecurity Landscape? The question that frequently arises among cybersecurity experts is, “How can we effectively mitigate these risks?” One noteworthy strategy adopted by professionals across ...