Application Security News and Articles
Skyhigh Security announced the expansion of its Skyhigh AI offering to include additional data protection solutions for Copilot for Microsoft 365 and ChatGPT Enterprise. This development follows the company’s earlier introduction of Skyhigh ...
Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction.
The post AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover appeared first on SecurityWeek.
Securonix announced the next phase of Securonix EON, introducing modular GenAI Agents. These specialized, decision-capable agents are designed to perform high-impact jobs to be done (JTBD) across the threat detection, investigation, and response ...
Arkose Labs has announced the expansion of its security portfolio with two new offerings: Arkose Edge and Arkose Scraping Protection. These innovations address the growing challenges large enterprises face in securing their complex digital ...
Chrome 136 and Firefox 138 were released in the stable channel with patches for multiple high-severity vulnerabilities.
The post Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.
Torii unveiled Torii Eko, an agentic SaaS Management Platform, ushering in a new era of AI-powered execution for modern software management. Torii Eko includes three intelligent in-platform agents: Eko Assist, available now; and Eko Insight and ...
Saviynt launched AI-powered Identity Security Posture Management (ISPM) as part of its converged Identity Cloud platform. Saviynt’s ISPM provides actionable insights into an organization’s identity and access posture, offering an intelligent ...
Trellix announced advancements to Trellix DLP Endpoint Complete, available globally in Q2 2025. New offerings and features incorporate intelligent capabilities to enhance Trellix’s data loss prevention (DLP) solutions, enabling customers to ...
The Ledger Flex is a hardware wallet designed for the secure storage of cryptocurrencies and NFTs. It combines security features with a user-friendly interface, making it suitable for both beginners and more experienced users. Ledger Flex stores ...
The mobile threat landscape has shifted. According to Zimperium’s 2025 Global Mobile Threat Report, attackers are now prioritizing mobile devices over desktops. For enterprises, mobile is no longer a secondary risk. It’s now one of the ...
Villain is an open-source Stage 0/1 command-and-control (C2) framework designed to manage multiple reverse TCP and HoaxShell-based shells. Beyond simply handling connections, Villain enhances these shells with added functionality, offering ...
Adversaries are infiltrating upstream software, hardware, and vendor relationships to quietly compromise downstream targets. Whether it’s a malicious update injected into a CI/CD pipeline, a rogue dependency hidden in open-source code, or ...
As AI brings about excitement and transformative potential, the report reveals that organizations are forging ahead with innovations despite increased security concerns, according to LevelBlue’s 2025 Futures Report. In fact, just 29% of ...
From OTAs to review aggregators to generative AI, new tools are bypassing first-party content. The result is a distorted customer journey and a growing gap in your visibility into user behavior, with clear implications for brand control and ...
Explore the implications of JPMorgan's open letter on SaaS security and how organizations can effectively and proactively address the evolving SaaS risks.
The post JPMorgan Just Made SaaS Security Impossible to Ignore | Grip appeared first on ...
San Francisco, Calif., Apr 29, 2025, CyberNewswire — SecAI, an AI-enriched threat intelligence company, made its official debut today at RSA Conference 2025 in San Francisco, marking the company’s first public appearance on the global ...
Are Your Cloud Security Decisions Truly Yours? Amid the dialing twists and turns of cybersecurity, have you ever wondered whether the freedom to make decisions about your Non-Human Identities (NHIs) and Secrets Security Management is still in ...
Can Non-Human Identities Truly Empower Independent Security Systems? Non-Human Identities (NHIs) are becoming an unavoidable part of our cyber defenses. Managing their lifecycle has become an integral aspect of creating independent security ...
Are Concerns Over Cloud Security Limiting Your Innovation? The rapid pace of digital transformation has propelled businesses towards adopting new technologies like cloud computing. However, as high-profile data breaches continue to make ...
Why are Least Privilege Tactics Crucial in the Cybersecurity Landscape? The question that frequently arises among cybersecurity experts is, “How can we effectively mitigate these risks?” One noteworthy strategy adopted by professionals across ...