Application Security News and Articles


UN Researchers Warn That Asian Scam Operations Are Spreading Across the Rest of the World

Transnational organized crime groups in East and Southeast Asia are spreading their lucrative scam operations across the globe, according to a UN report. The post UN Researchers Warn That Asian Scam Operations Are Spreading Across the Rest of the ...

Stellar Cyber boosts security operations with human-augmented Autonomous SOC

At the upcoming RSAC 2025 Conference in San Francisco, Stellar Cyber will unveil the next evolution of modern SecOps: the human-augmented Autonomous SOC, powered by its breakthrough Agentic AI framework. See the human-augmented Autonomous SOC in ...

Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000

Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks. The post Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000 ...

COGNNA Adds AI Agents to SOC Platform

COGNNA today unveiled a security operations center (SOC) platform infused with artificial intelligence (AI) agents trained to detect, analyze and respond to threats in a way that promises to dramatically reduce alert fatigue. The post COGNNA Adds ...

Morphing Meerkat Phishing Kit: A Deep Dive into Its Threats & Tactics

Discover how the Morphing Meerkat phishing kit powers phishing-as-a-service (PhaaS) attacks, evades detection, and how you can detect and stop it. The post Morphing Meerkat Phishing Kit: A Deep Dive into Its Threats & Tactics appeared first ...

The Expand, Enhance, Expire (3E Framework) for Successful Product Innovation

Product leaders often think about growth in a linear fashion — more features, more markets, more users. But true innovation requires a more strategic and...Read More The post The Expand, Enhance, Expire (3E Framework) for Successful Product ...

DeepSeek AI Banned on Government Devices Amid National Security Concerns

Discover why Chinese AI DeepSeek is labeled a 'profound threat' to US national security. Stay informed on global bans and cybersecurity measures. The post DeepSeek AI Banned on Government Devices Amid National Security Concerns appeared first on ...

Google DeepMind Unveils Genie 2: Advanced AI for World-Building

Explore Genie 2, an advanced AI model by Google DeepMind, that generates interactive 3D environments for training AI agents. Discover its potential today! The post Google DeepMind Unveils Genie 2: Advanced AI for World-Building appeared first on ...

StrikeReady Security Command Center v2 accelerates threat response

For years, security teams have operated in reactive mode, contending with siloed tools, fragmented intelligence, and a never-ending backlog of alerts. Traditional Security Operations platforms were supposed to unify data and streamline ...

BigID unveils AI Privacy Risk Posture Management

BigID launched AI Privacy Risk Posture Management to help organizations manage data privacy risks across the AI lifecycle. With automated assessments and actionable privacy controls, BigID empowers enterprises to govern AI responsibly while ...

RSAC 2025 Innovation Sandbox | EQTY Lab: Governance Pioneer and Technical Architecture for Building a Trusted AI Ecosystem

Company Overview Founded in 2022 and headquartered in Los Angeles, California, USA, EQTY Lab AG is a technology company focusing on AI governance and security. In just a few years, the company has established itself as a leader in AI trusted ...

How to Set Up SPF, DKIM, and DMARC for Customer.io

Learn how to set up SPF, DKIM, and DMARC for Customer.io to boost email deliverability and protect your domain from spoofing. The post How to Set Up SPF, DKIM, and DMARC for Customer.io appeared first on Security Boulevard.

CSI announces two AI-powered AML compliance and fraud detection solutions

CSI launched its AI-powered AML compliance and fraud detection solutions: TruDetect and TruProtect. The solutions are powered by DATASEERS, a data-driven B2B SaaS company specialized in harnessing data, automating manual processes and providing ...

The legal blind spot of shadow IT

Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance violations, expose sensitive data, or break contracts. Let’s look at where the legal landmines are and what CISOs can ...

What is Agentless Asset Discovery in Cloud Security?

The digital world that feeds us is hyperconnected. Cloud computing is the most vital organ of modern organizations in information technology. It brings flexibility, scalability, and innovation. Within these power stations also lies an ...

Email security, simplified: How PowerDMARC makes DMARC easy

Email is still the top way attackers get into organizations. Now, big players like Google, Yahoo, and Microsoft are cracking down. They’re starting to require email authentication, specifically DMARC. For many companies, this means it’s no ...

The C-suite gap that’s putting your company at risk

New research from EY US shows that cyber attacks are creating serious financial risks. C-suite leaders don’t always agree on how exposed their companies are or where the biggest threats come from. CISOs more concerned about cybersecurity ...

What school IT admins are up against, and how to help them win

School IT admins are doing tough, important work under difficult conditions. From keeping Wi-Fi stable during exams to locking down systems from phishing emails, their job is part technician, part strategist, part firefighter. But they’re ...

Compliance weighs heavily on security and GRC teams

Only 29% of all organizations say their compliance programs consistently meet internal and external standards, according to Swimlane. Their report reveals that fragmented workflows, manual evidence gathering and poor collaboration between ...

Introducing SaaS Breach Center | Grip

Detect and contain SaaS breaches quickly with Grip's SaaS Breach center. The post Introducing SaaS Breach Center | Grip appeared first on Security Boulevard.