Application Security News and Articles
After announcing that the cyberattack-caused disruption to factories would continue, Jaguar Land Rover is now confirming a data breach.
The post Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack appeared first on SecurityWeek.
Creator, Author and Presenter: Moses Schwartz
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...
Sofia, Bulgaria, 10th September 2025, CyberNewsWire
The post Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security appeared first on Security Boulevard.
Coro announced the latest version of its platform. Coro 3.6 leverages AI to transform complex security into easy-to-use security for resource-constrained SMBs. Today, SMBs require a solution to enhance their security posture. Coro’s unified ...
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges ...
Geordie has developed a platform that gives enterprises deep visibility into AI agents and what they are doing.
The post Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform appeared first on SecurityWeek.
Picture this: Accounts Payable gets a “new remittance instructions” email from a frequent supplier. The sender name is right, the thread is a real PO reply‑chain, and the tone mirrors past messages. A shift supervisor is warning about ...
The investment will accelerate product innovation and will fuel the security company’s expansion in the US.
The post Red Access Raises $17 Million for Agentless Security Platform appeared first on SecurityWeek.
Discover why startups face the Auth0 “growth penalty.” Learn pricing mechanics, hidden costs, and affordable alternatives for scalable growth.
The post Auth0 Pricing Explained (And Why Startups Call It a Growth Penalty) appeared first on ...
Explore why user safety should be the core of SSO design. Learn how MFA, encryption, and compliance keep authentication secure and trustworthy.
The post Why User Safety Should Be a Core SSO Design Principle appeared first on Security Boulevard.
Apple’s new Memory Integrity Enforcement (MIE) brings always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes.
The post Apple Unveils iPhone Memory Protections to Combat ...
Discover how MFA, SSO, and access controls secure AI video creation in 2025, balancing creativity, compliance, and enterprise-level protection.
The post How Secure Is AI Video Creation? SSO, MFA, and Access Control in 2025 appeared first on ...
On September 2025 Patch Tuesday, Microsoft has released patches for 80+ vulnerabilities in its various software products, but the good news is that none of them are actively exploited. Among the critical and important vulnerabilities patched by ...
Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks. SMS phishing, commonly called “smishing,” is a cyberattack where fraudsters send misleading ...
Tel Aviv–based startup replaces vaults and secrets managers with just-in-time policies, aiming to eliminate credentials entirely.
The post Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform appeared first on ...
High-severity vulnerabilities could lead to remote code execution, privilege escalation, information disclosure, and configuration tampering.
The post Fortinet, Ivanti, Nvidia Release Security Updates appeared first on SecurityWeek.
Volodymyr Tymoshchuk allegedly hit hundreds of organizations with the LockerGoga, MegaCortex, and Nefilim ransomware families.
The post US Offers $10 Million Reward for Ukrainian Ransomware Operator appeared first on SecurityWeek.
Most organizations run an annual network penetration test, remediate the issues it uncovers, and move on. But attackers are probing networks every day, using publicly available tools to exploit common misconfigurations and overlooked ...
Designed to intercept cryptocurrency transactions, the malicious code reached 10% of cloud environments.
The post Highly Popular NPM Packages Poisoned in New Supply Chain Attack appeared first on SecurityWeek.
As enterprises adopt AI agents at scale, security must evolve beyond policies and human oversight. From protecting enterprise data and preventing prompt injection to enforcing permission boundaries and agent guardrails, platform providers—not ...