Application Security News and Articles


NDSS 2025 – The Skeleton Keys: A Large Scale Analysis Of Credential Leakage In Mini-Apps

----------- SESSION Session 3C: Mobile Security ----------- ----------- Authors, Creators & Presenters: Yizhe Shi (Fudan University), Zhemin Yang (Fudan University), Kangwei Zhong (Fudan University), Guangliang Yang (Fudan University), Yifan ...

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Tel Aviv, Israel, 19th November 2025, CyberNewsWire The post Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications appeared first on Security Boulevard.

Veeam Data Platform v13 strengthens AI-driven analysis

Veeam Software launches Veeam Data Platform v13, delivering the resilience, flexibility, and intelligence needed for an AI-powered future. With a modern platform architecture, AI-powered intelligence, an expansive hypervisor integration model, ...

7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)

NHS England Digital, the technology arm of the publicly-funded health service for England, has issued a warning about a 7-Zip vulnerability (CVE-2025-11001) being exploited by attackers. “Active exploitation of CVE-2025-11001 has been ...

Immersive unveils Dynamic Threat Range to transform cyber readiness testing

Immersive announced the general availability of Dynamic Threat Range, a new capability within its Immersive One platform that transforms how organizations validate and improve cyber readiness. Dynamic Threat Range runs authentic, full-chain, ...

Strata introduces AI Identity Gateway to secure and govern agentic systems

Strata Identity announced the availability of the AI Identity Gateway, an enterprise-grade runtime identity and policy-enforcement control point for agentic behavior. As part of Maverics for Agentic Identity, the AI Identity Gateway provides ...

How Microsegmentation Powers Breach Readiness and Cyber Resilience

“The attackers are not waiting for you to make the decision. Attackers will continue to attack. And just because you are not able to see it doesn’t mean the attack has not happened.” That’s the reality ColorTokens CEO and ...

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers

Palo Alto, California, 19th November 2025, CyberNewsWire The post Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers appeared first on Security Boulevard.

Exam prep hacked: Study tips and tricks that really work

Ready to get certified but not sure where to start? Get insider tips and tricks on what to do from day one to test day. Join ISC2-certified instructors and an audience of your peers for this live interactive webinar. Find out what to do in the ...

Active Directory Trust Misclassification: Why Old Trusts Look Like Insecure External Trusts

Tenable Research reveals an Active Directory anomaly: intra-forest trusts created under Windows 2000 lack a key identifying flag, even after domain and forest upgrades. Learn how to find this legacy behavior persisting to this day, and use ...

AppOmni Expands AI Security with Agentic AI Security for ServiceNow

See how AppOmni AgentGuard defends ServiceNow AI agents from prompt injection and access risks, building trust and compliance across platforms. The post AppOmni Expands AI Security with Agentic AI Security for ServiceNow appeared first on ...

Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding

The cybersecurity startup will use the funds to expand its engineering team, extend collaborations, and get ready for enterprise rollout. The post Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding appeared first on SecurityWeek.

Compromised Credential Detection vs. Password Policy Enforcement

Credential detection finds exposed passwords your policy can’t. Learn how continuous credential checks close the security gap. The post Compromised Credential Detection vs. Password Policy Enforcement appeared first on Security Boulevard.

AppOmni Delivers Industry First Real-Time Agentic AI Security for ServiceNow

AppOmni expands SaaS security with AgentGuard and AI Security Posture Management to provide real-time protection, visibility, and posture automation for AI agents in ServiceNow and other SaaS environments. The post AppOmni Delivers Industry First ...

Blocking Traffic Manipulation in AWS Starts With IAM

Tl;DR Networking in the Cloud Without domain name resolution and effective traffic routing, the cloud breaks. This proved true last month, when a DNS issue affecting the AWS us-east-1 DynamoDB API endpoint disrupted operations at thousands of ...

Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign

Threat actors are abusing Ray’s lack of authentication to deploy LLM-generated payloads and cryptocurrency miners. The post Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign appeared first on SecurityWeek.

BigID uses agentic AI to automate privacy and compliance mapping

BigID announced the agentic AI–powered data mapping capability that automates and visualizes personal data flows for privacy and compliance. Agentic Data Mapping strengthens privacy programs with AI-driven automation, helping organizations ...

Automating SaaS Onboarding: Simplifying and Testing Your Enterprise SSO Flows

Discover how to automate SaaS enterprise onboarding by testing SSO flows to ensure seamless, secure, and reliable authentication for your users. The post Automating SaaS Onboarding: Simplifying and Testing Your Enterprise SSO Flows appeared first ...

eSchool News: How K-12 IT Teams Lock Down QR-Based SSO Without Hurting Usability

This article was originally published in eSchool News on 11/10/25 by Charlie Sander. Phishing via QR codes, a tactic now known as “quishing,” involves attackers embedding malicious QR codes in emails or posters Schools can keep QR logins safe ...

Black Kite launches AI Agent to automate third-party risk work

Black Kite announced the release of Black Kite AI Agent, an agent that automatically investigates, assesses, and reports on third-party risk. “Our strong performance validates that our accuracy, scalability, and transparent approach is more ...