Application Security News and Articles


Why IT Security and IT Operations Are Converging (+ What It Means for Your Business)

The lines between IT security and IT operations are blurring—and for good reasons. Historically, these functions operated in silos: operations focused on performance, uptime and infrastructure health, while security zeroed in on threats, ...

Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse

Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchronization options can be exploited. Synchronizing ...

Push Security Raises $30 Million in Series B Funding

Push Security has raised $30 million in Series B funding to scale its browser-based identity security platform. The post Push Security Raises $30 Million in Series B Funding appeared first on SecurityWeek.

AttackIQ Academy Enterprise: Cybersecurity Training Dashboard for Security Teams

AttackIQ Academy Enterprise is our answer to this challenge.  This new solution gives security leaders clear visibility into their employees’ learning progress through an interactive dashboard displaying comprehensive training metrics and ...

AVX ONE PQC Tool delivers crypto inventory, risk insights, and readiness scoring

AppViewX has announced the launch of the AVX ONE Post-Quantum Cryptography (PQC) Assessment Tool that generates a Cryptographic Bill of Materials and PQC readiness score. By scanning code, dependencies, configurations and certificates in ...

GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection

As cyber threats in healthcare continue to evolve, GitGuardian strengthens its commitment to the sector by joining Health-ISAC and offering members enhanced secrets detection capabilities to protect sensitive data. The post GitGuardian Joins ...

All Exposures Aren’t Equal: The More Effective Path to CTEM

CTEM consistsof multiple processes to help organizations scope, discover, prioritize, validate, and mobilize to mitigate risk. It also includes capabilities like Threat-Informed Defense (TID) and Breach and Attack Simulation (BAS) that work ...

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)

If your organization is using Commvault Command Center for your data protection, backup creation, configuration and restoration needs, you should check whether your on-premise installation has been upgraded to patch a critical vulnerability ...

SecLytics Rebrands as Augur Security, Raises $7M in Seed Funding

AI-powered threat prevention company Augur (rebranded from SecLytics) has raised $7 million in seed funding. The post SecLytics Rebrands as Augur Security, Raises $7M in Seed Funding appeared first on SecurityWeek.

DirectDefense launches Security Essentials to protect growing SMBs

DirectDefense has launched DirectDefense Security Essentials, a fully managed, subscription-based security program purpose-built for small to mid-sized businesses (SMBs). With Security Essentials, DirectDefense is addressing the critical security ...

Skyhawk Security brings preemptive cloud app defense to RSAC 2025

Skyhawk Security is adding new protection for custom-built cloud applications. The company announced the update to its AI-powered Autonomous Purple Team for RSAC 2025 Conference, which starts April 28 in San Francisco. The AI-based purple team ...

AI-Powered Polymorphic Phishing Is Changing the Threat Landscape

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates. The post AI-Powered Polymorphic Phishing Is Changing the Threat Landscape ...

FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024

The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion. The post FBI: Cybercrime Losses Surpassed $16.6 Billion in 2024 appeared first on SecurityWeek.

Understanding 2024 cyber attack trends

Mandiant has released the M-Trends 2025 report, which outlines global cyber attack trends based on their own incident response engagements from 2024. Key trends and insights In 2024, Mandiant handled more incidents in the financial sector than in ...

AuditBoard RegComply helps organizations with ongoing regulatory updates

AuditBoard announced RegComply, a new solution for regulatory compliance management to help organizations stay on top of changing regulations and manage their compliance programs with integrated risk insights. The new solution includes new AI ...

Swimlane CAR solution automates compliance control mapping

Swimlane announced Compliance Audit Readiness (CAR) Solution, designed to streamline compliance management and accelerate audit readiness. Powered by the Swimlane Turbine AI Automation Platform and built on the Secure Controls Framework, CAR ...

Metomic AI Data Protection prevents data leakage in AI tools

Metomic launched AI Data Protection Solution, an offering designed to prevent sensitive business data from being inadvertently exposed through AI tools such as ChatGPT, Copilot, Glean, Notion AI, Box AI, and others. As enterprises accelerate AI ...

Veracode platform enhancements improve software security

Veracode announced new capabilities to help organizations address emerging threats, giving security professionals better visibility and control in one place. The launch includes new AI-powered functionality in the Dynamic Application Security ...

Blue Shield of California Data Breach Impacts 4.7 Million People

Blue Shield of California says a website misconfiguration exposed the health information of its members to Google. The post Blue Shield of California Data Breach Impacts 4.7 Million People appeared first on SecurityWeek.

Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact 

Adversary-in-the-middle fraud (AiTM) represents a significant, ongoing challenge for businesses, with tactics like email hijacking, AI attacks and account takeovers becoming increasingly complex. The post Adversary-in-the-Middle Attacks Persist ...