Application Security News and Articles


AI Agents Mark the End of Traditional GRC 

AI agents are transforming governance and compliance from slow, manual processes into real-time, autonomous systems. By eliminating data silos, automating risk assessments, and enabling multi-modal collaboration, enterprises can achieve ...

Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware

A ransomware negotiator and an incident response manager have been indicted in Florida for allegedly conspiring to deploy the ALPHV/BlackCat ransomware against multiple US companies and extorting nearly $1.3 million from one of the victims. ...

Deepwatch Launches NEXA™: The MDR Industry’s First Collaborative Agentic AI Ecosystem for Unparalleled Security Outcomes

Intelligent AI agents work in collaboration with humans to redefine MDR with clear, actionable insights that accelerate threat resolution and strengthen security posture Palo Alto, CA—November 4, 2025—Deepwatch, the leader in Precision MDR ...

K-12 Google & Microsoft Security and Safety Through a “Single Pane of Glass”

Cloud Monitor Helps Tyrone Area School District’s IT Team Keep Accounts Secure, Students Safe, and Security Budget Justified Tyrone Area School District, located in Tyrone, Pennsylvania, serves a community of approximately 1,700 students and ...

European authorities dismantle €600 million crypto scam network

Nine people have been arrested in a coordinated international operation targeting a large cryptocurrency money laundering network that defrauded victims of more than €600 million. The operation was led by Eurojust, the EU’s judicial ...

Apple Patches 19 WebKit Vulnerabilities 

Apple has released iOS 26.1 and macOS Tahoe 26.1 with patches for over 100 vulnerabilities, including critical flaws. The post Apple Patches 19 WebKit Vulnerabilities  appeared first on SecurityWeek.

Closing the Application Layer Security Blind Spot with Contrast & Microsoft Sentinel | Contrast Security

Microsoft Sentinel has rapidly become a cornerstone for security operations, offering powerful, cloud-native Security Information and Event Management (SIEM) capabilities. Security Operations Center (SOC) teams rely on it to get a unified view of ...

Zscaler Acquires AI Security Company SPLX

SPLX red teaming, asset management, and threat inspection technology will enable Zscaler to expand its Zero Trust Exchange platform. The post Zscaler Acquires AI Security Company SPLX appeared first on SecurityWeek.

Oct Recap: New and Newly Deniable GCP Privileged Permissions

As October 2025 wraps up, Sonrai’s latest analysis of Google Cloud Platform permissions reveals both newly introduced privileged actions and those that have become newly enforceable through the V2 API, meaning organizations can now explicitly ...

Android Update Patches Critical Remote Code Execution Flaw

The November 2025 Android patches resolve two vulnerabilities, both in the platform’s System component. The post Android Update Patches Critical Remote Code Execution Flaw appeared first on SecurityWeek.

Oct Recap: New AWS Privileged Permissions and Services

As October 2025 closes, Sonrai’s latest analysis of new AWS permissions reveals a continued trend: incremental privilege changes with outsized impact. This month’s additions span OpenSearch Ingestion, Aurora DSQL, QuickSight, Parallel ...

Dohop Uses DataDome to Block Millions of Scrapers & Protect 75+ Airline Partners

Dohop cut bot traffic by 70% with DataDome, blocking millions of scrapers and protecting 75+ airline partners from API overload and downtime. The post Dohop Uses DataDome to Block Millions of Scrapers & Protect 75+ Airline Partners appeared ...

New Cisco solutions bring speed, security, and automation to distributed AI networks

Cisco is introducing innovations to modernize campus, branch, and industrial networks to support the growing use of AI. Its solutions simplify operations, scale with evolving business needs, and enhance security, all of which are critical to ...

How nations build and defend their cyberspace capabilities

In this Help Net Security interview, Dr. Bernhards Blumbergs, Lead Cyber Security Expert at CERT.LV, discusses how cyberspace has become an integral part of national and military operations. He explains how countries develop capabilities to act ...

Zscaler acquires SPLX to help organizations secure their AI investments

Zscaler has acquired AI security pioneer SPLX, extending the Zscaler Zero Trust Exchange platform with shift-left AI asset discovery, automated red teaming, and governance, so organizations can secure their AI investments from development through ...

Graylog’s AI features improve security outcomes across hybrid environments

Graylog launched its Graylog Security Fall 2025 release. The latest version introduces AI-driven insights, Model Context Protocol (MCP) Server Access, and Amazon Security Data Lake integration, enabling SOCs to operate with clarity, speed, and ...

NSE System Audit – What is it and Who Needs It?

System Audit is a mandatory technical and compliance assessment introduced by SEBI and implemented by the National Stock Exchange (NSE). Its primary purpose is to ensure that every trading member or broker operates secure, reliable, and compliant ...

Cisco’s platform enhancements strengthen security for MSPs

Cisco announced a significant platform advancement designed to empower MSPs to deliver security services. This innovation adds foundational multi-customer management capabilities within Security Cloud Control, Cisco’s unified, AI-powered ...

Uncovering the risks of unmanaged identities

Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These unmanaged identities quietly expand your ...

Cybercriminals have built a business on YouTube’s blind spots

The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment, information, and deception coexist. Alongside everyday videos, the site has seen ...