Application Security News and Articles


AI Agents are Man-in-the-Middle Attacks

After 25 years defending against man-in-the-middle attacks, a security veteran explains why most AI agents replicate the same architectural risks—creating compliance gaps, opaque decision-making, and zero-trust violations CISOs can’t ...

LLMs work better together in smart contract audits

Smart contract bugs continue to drain real money from blockchain systems, even after years of tooling and research. A new academic study suggests that large language models can spot more of those flaws when they work in coordinated groups instead ...

Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management

NAKIVO Backup & Replication v11.1 brings a host of benefits to MSPs and their clients. It eliminates the need for client-side port configuration, enhances security with encrypted multi-platform support, and introduces automated failover ...

Identity risk is changing faster than most security teams expect

Security leaders are starting to see a shift in digital identity risk. Fraud activity is becoming coordinated, automated, and self-improving. Synthetic personas, credential replay, and high speed onboarding attempts now operate through shared ...

New infosec products of the week: December 19, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Apiiro, Astra Security, Push Security, Trellix, and XM Cyber. Apiiro unveils AI SAST built on deep code analysis to eliminate false positives Apiiro ...

Unlocking New Possibilities for Security Operations: NSFOCUS’s AI Agent Capabilities Recognized by Authoritative Institution

Recently, Forrester, a globally renowned independent research and advisory firm, released the report “Navigate The AI Agent Ecosystem In China, Forrester Research, October 2025[1].” NSFOCUS was successfully included in this report. In the ...

AI-Driven Anomaly Detection in Post-Quantum Context Streams

Discover how AI-driven anomaly detection safeguards post-quantum context streams in Model Context Protocol (MCP) environments, ensuring robust security for AI infrastructure against future threats. The post AI-Driven Anomaly Detection in ...

How to Integrate SSO: Developer Guide with Code Examples & Flow Diagrams

Learn how to integrate Single Sign-On (SSO) into your applications with this comprehensive developer guide. Includes code examples, flow diagrams, and best practices for secure authentication. The post How to Integrate SSO: Developer Guide with ...

Exploring Biometric Multi-Factor Authentication

Explore biometric mfa for enhanced security. Learn about implementation, benefits, hacking techniques, and how to protect your systems. A must-read for developers. The post Exploring Biometric Multi-Factor Authentication appeared first on ...

Chinese Hackers Exploited a Zero-Day in Cisco Email Security Systems

Cisco disclosed that a China-linked hacking group exploited a previously unknown vulnerability in its email security products, allowing attackers to compromise systems that sit at the center of enterprise email traffic. The flaw affected Cisco ...

Risk Management in Banking: Leveraging AI and Advanced Analytics

Key Takeaways Risk management in banking depends on how effectively information moves through established structures. A persistent challenge is how early emerging signals are recognized, how consistently they’re interpreted across teams, and ...

RegScale Open Sources OSCAL Hub to Further Compliance-as-Code Adoption

RegScale this week added an open source hub through which organizations can collect and organize compliance data based on the Open Security Controls Assessment Language (OSCAL) framework. Announced at the OSCAL Plugfest conference, the OSCAL Hub ...

Building Cybersecurity Companies from Europe

What Founders Really See When They Try to Scale The post Building Cybersecurity Companies from Europe appeared first on Security Boulevard.

Why is least privilege important for NHIs in Agentic AI

How Do Non-Human Identities Enhance Cybersecurity? What role do Non-Human Identities (NHIs) play in strengthening cybersecurity frameworks? With data management experts and cybersecurity specialists delve deeper into Agentic AI, the management ...

What is secrets sprawl and how does it impact NHIs

How Secure Are Your Non-Human Identities in the Face of Secrets Sprawl? Is secrets sprawl silently jeopardizing your organization’s cybersecurity framework? This pressing question is becoming more common among cybersecurity professionals tasked ...

How does secrets rotation benefit Agentic AI systems

How Can Secrets Rotation Enhance Agentic AI Security? Have you ever contemplated the growing complexity of security? With advanced technologies like Agentic AI revolutionize industries, the critical aspect of securing these systems takes center ...

INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskilling

Cary, North Carolina, USA, 18th December 2025, CyberNewsWire The post INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskilling appeared first on Security Boulevard.

NDSS 2025 – PhantomLiDAR: Cross-Modality Signal Injection Attacks Against LiDAR

Session 6C: Sensor Attacks Authors, Creators & Presenters: Zizhi Jin (Zhejiang University), Qinhong Jiang (Zhejiang University), Xuancun Lu (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu ...

Client ID Metadata Documents (CIMD): The Future of MCP Authentication

Struggling with MCP authentication? The November 2025 spec just changed everything. CIMD replaces DCR's complexity with a simple URL-based approach—no registration endpoints, no client ID sprawl, built-in identity verification. Here's your ...

The Agentic Era is Here: Announcing the 4th Edition of AI & API Security For Dummies

If you look at the headlines, the story is about Artificial Intelligence. But if you look at the architecture, the story is about APIs. The reality of modern tech is simple: You can’t have AI security without API security. As we move rapidly ...