Application Security News and Articles


What future innovations excite leaders in Agentic AI security

How Are Non-Human Identities Transforming the Landscape of Cybersecurity? Have you ever considered what constitutes the “identity” of a machine where technology evolves at breakneck speed? The concept of Non-Human Identities (NHIs) is ...

What makes an effective Secret Scanning solution

How Can Organizations Achieve Robust Cybersecurity with Effective Secret Scanning Solutions? Where cyber threats consistently challenge organizations, the focus on securing Non-Human Identities (NHIs) has become critical. NHIs, essentially ...

Are current IAM solutions capable of handling NHIs effectively

Can Your IAM Solutions Handle Non-Human Identities Efficiently? Where organizations are increasingly relying on digital frameworks, the role of Non-Human Identities (NHIs) has become pivotal, especially in cloud environments. But how can we ...

How adaptable are AI-driven security systems to new threats

How Do AI-Driven Security Systems Keep Up with New Threats? How can organizations ensure their AI-driven security systems remain adaptable to new threats? With cyber threats grow in sophistication and frequency, the ability of security systems to ...

When Machines Attack Machines: The New Reality of AI Security

Unlike conventional IT systems—with bounded entry points, predictable patch cycles, and known vulnerabilities—large language models (LLMs) and next-generation AI agents create an attack surface so broad, dynamic, and interconnected that ...

Cisco Firewall, Unified CCX, and ISE Vulnerability Summary (Nov 2025)

CVE-2025-20333 and CVE-2025-20362 Details Cisco disclosed a new active attack variant targeting and exploiting the previously known vulnerabilities in the Cisco Secure Firewall ASA and FTD  software (CVE-2025-20333 and CVE-2025-20362) leading to ...

NDSS 2025 – Detecting IMSI-Catchers By Characterizing Identity Exposing Messages In Cellular Traffic

SESSION Session 3B: Wireless, Cellular & Satellite Security ----------- ----------- Authors, Creators & Presenters: Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich), Simon Erni ...

Foundational Flaws: How Simple Security Missteps Cost You

The post Foundational Flaws: How Simple Security Missteps Cost You appeared first on AI Security Automation. The post Foundational Flaws: How Simple Security Missteps Cost You appeared first on Security Boulevard.

Black Friday Bot Warning: The Products to Protect

New intelligence from KasadaIQ and StockX highlights where holiday demand and bot attacks are headed next. Get a quick look at the categories driving shopper frenzy and the defense strategies retailers should prioritize going into Black ...

A Perfect Storm: DDoS Attack Hits Turkish Luxury Retailer During Fall Collection Launch

When high-stakes events meet unprecedented attack volumes, disruption can be devastating. A Turkish luxury retail platform experienced this firsthand when it was hit with a record-breaking application-layer DDoS attack, peaking at 14.2 million ...

Randall Munroe’s XKCD ‘’Shielding Chart”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Shielding Chart” appeared first on Security Boulevard.

Cloudflare to acquire Replicate, aiming for seamless serverless AI at global scale

Cloudflare has agreed to acquire Replicate, an AI platform that makes it easy for developers to deploy and run AI models. This acquisition will accelerate the company’s vision to make Cloudflare Workers the leading end-to-end platform for ...

Shared Intel Q&A: Viewing CMMC as a blueprint for readiness across the defense supply chain

Small and mid-sized contractors play a vital role in the U.S. defense industrial base — but too often, they remain the weakest link in the cybersecurity chain. Related: Pentagon enforcing CMMC RADICL’s  2025 DIB Cybersecurity Maturity Report ...

A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major ...

Your data, your model: Self-serve custom entity types in Tonic Textual

Tonic Textual’s new Custom Entity Types let teams define, train, and deploy entity models on their own data—no data science skills needed. The post Your data, your model: Self-serve custom entity types in Tonic Textual appeared first on ...

NDSS 2025 – Time-Varying Bottleneck Links In LEO Satellite Networks

SESSION Session 3B: Wireless, Cellular & Satellite Security ----------- ----------- Authors, Creators & Presenters: Yangtao Deng (Tsinghua University), Qian Wu (Tsinghua University), Zeqi Lai (Tsinghua University), Chenwei Gu (Tsinghua ...

Logitech confirms data breach

Logitech, the Swiss multinational electronics and technology company best known for marketing computer peripherals and hardware, has suffered a data breach. “While the investigation is ongoing, at this time Logitech believes that the ...

Iranian Hackers Target Defense and Government Officials in Ongoing Campaign

The state-sponsored APT has been targeting the victims’ family members to increase pressure on their targets. The post Iranian Hackers Target Defense and Government Officials in Ongoing Campaign appeared first on SecurityWeek.

Synack unveils Sara Pentest to accelerate scalable AI-driven penetration testing

Synack has announced Sara Pentest, a new agentic AI product built on the Synack Autonomous Red Agent (Sara) architecture. Sara Pentest performs penetration testing on hosts and web applications, speeding up vulnerability detection and remediation ...