Application Security News and Articles


Fake DeepSeek Sites Used for Credential Phishing, Crypto Theft, Scams

Researchers see dozens of fake DeepSeek websites used for credential phishing, cryptocurrency theft, and scams. The post Fake DeepSeek Sites Used for Credential Phishing, Crypto Theft, Scams appeared first on SecurityWeek.

7AI Raises $36 Million in Seed Funding for Agentic Security Platform

7AI has launched an agentic security platform, which uses AI agents to handle repetitive tasks, and raised $36 million in seed funding. The post 7AI Raises $36 Million in Seed Funding for Agentic Security Platform appeared first on SecurityWeek.

Onapsis Control Central secures SAP software development lifecycle

Onapsis announced Onapsis Control Central for SAP application security testing and custom code security supporting RISE with SAP transformations. As the latest addition to its Onapsis Control product line, Control Central is a reinvention of ...

Cyabra Insights protects against AI-driven digital disinformation

Cyabra introduces Insights, a new AI-feature designed to transform complex social media disinformation data into clear, actionable answers in seconds. False narratives, fake accounts, and AI-generated content are spreading faster than ever, ...

The overlooked risks of poor data hygiene in AI-driven organizations

In this Help Net Security interview, Oliver Friedrichs, CEO at Pangea, discusses why strong data hygiene is more important than ever as companies integrate AI into their operations. With AI-driven applications handling sensitive enterprise data, ...

Enterprises invest heavily in AI-powered solutions

AI is driving significant changes in attack sources, with 88% of enterprises observing an increase in AI-powered bot attacks in the last two years, according to Arkose Labs. 53% said they have lost between $10 million to over $500 million during ...

How to customize Safari for private browsing on iOS

Apple’s Safari browser includes several features aimed at enhancing privacy while browsing the web. Two of the most notable privacy features are Intelligent Tracking Prevention (ITP) and Private Browsing mode. Intelligent Tracking Prevention ...

Bots Win, Gamers Lose: Inside the Latest 2025 NVIDIA GPU Launch

Scalper bots hit NVIDIA’s RTX 5090 & 5080 launch, wiping out stock in minutes. Learn how bots are bypassing traditional defenses & how Kasada can stop them. The post Bots Win, Gamers Lose: Inside the Latest 2025 NVIDIA GPU Launch ...

Gaining Assurance with Advanced Secrets Rotation

The Benefits of Harnessing Advanced Secrets Rotation How can companies ensure maximum cybersecurity assurance when dealing with Non-Human Identities (NHIs)? The answer lies in effective NHI and Secrets Management, and a central component of this ...

Delivering Value with Streamlined IAM Protocols

Why is IAM Crucial in Delivering Value to Modern Businesses? Companies must reassess their cybersecurity strategies and adapt to the changing landscape. Non-Human Identities (NHIs) and Secrets Security Management have emerged as critical ...

Unlocking the Freedom of Secure Cloud Environments

Is Your Cloud Environment Truly Secure and Free? Have you ever wondered if your cloud environment is as secure as it could be? The management of Non-Human Identities (NHIs) and Secrets is a revolutionary methodology that offers a sense of freedom ...

Semgrep Raises $100M for AI-Powered Code Security Platform

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures.  The post Semgrep Raises $100M for AI-Powered Code Security Platform appeared first on SecurityWeek.

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US

DeepSeek has computer code that could send some user login information to China Mobile. The post Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US appeared first on SecurityWeek.

DEF CON 32 – DIY Pharmaceuticals

Authors/Presenters: Michael Laufer Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

DeepSeek AI Model Riddled With Security Vulnerabilities

Security researchers have uncovered serious vulnerabilities in DeepSeek-R1, the controversial Chinese large language model (LLM) that has drawn widespread attention for its advanced reasoning capabilities. The post DeepSeek AI Model Riddled With ...

In The News | TCEA 2025: 10 Ways K–12 Schools Can Secure Their Microsoft and Google Environments

This article was originally published in EdTech Magazine on 02/03/25 by Taashi Rowe. These simple steps can help schools comply with federal laws while protecting networks and student data. Hackers don’t have to use very sophisticated, ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #323 Why Work Agile?

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Are You Still Using VMware Tanzu? (And Is Now the Time to Migrate?)

Many organizations used VMware Tanzu when they were seeking to modernize their applications and infrastructure. This suite of products and services was designed to help organizations build, manage, and run modern applications on Kubernetes across ...

Fake VS Code extension on npm uses altered ScreenConnect utility as spyware

A counterfeit 'Truffle for VS Code' extension, published on the npmjs registry, abuses the ConnectWise ScreenConnect remote desktop utility, allowing threat actors to compromise Windows systems that install the package. The post Fake VS Code ...

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)

XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution for warehouse management and order ...