Application Security News and Articles


AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition

Frost & Sullivan honors AppOmni for excellence in SaaS Security Posture Management, recognizing its innovation, scale, and customer impact. The post AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition ...

AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security Posture Management, Earns Tech Innovation Leadership Recognition

AppOmni is named Growth & Innovation Leader in 2025 Frost Radar™ for SSPM and awarded with Tech Innovation Recognition by Frost & Sullivan. The post AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security ...

Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)

Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers. An out-of-band update Last week’s release of an emergency fix for CVE-2025-59287, a ...

Major US Telecom Backbone Firm Hacked by Nation-State Actors

Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.  The post Major US Telecom Backbone Firm Hacked by Nation-State Actors appeared first on SecurityWeek.

Aembit Introduces Identity and Access Management for Agentic AI

Silver Spring, USA/ Maryland, 30th October 2025, CyberNewsWire The post Aembit Introduces Identity and Access Management for Agentic AI appeared first on Security Boulevard.

Security Without Friction: How Repoflow Created a DevSecOps Package Manager with Grype

RepoFlow was created with a clear goal: to provide a simple package management alternative that just works without the need for teams to manage or maintain it. Many existing solutions required constant setup, tuning, and oversight. RepoFlow ...

Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

The Canadian Centre for Cyber Security has warned CISOs that hacktivists are increasingly targeting internet-exposed ICS. The post Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm appeared first on SecurityWeek.

The Correlation Between MSP Growth and Proper Client Prospecting

What deems a prospect good or bad for your business? The post The Correlation Between MSP Growth and Proper Client Prospecting appeared first on Security Boulevard.

136 NPM Packages Delivering Infostealers Downloaded 100,000 Times

The packages deployed malicious code harvesting system information, credentials, tokens, API keys, and other sensitive information. The post 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times appeared first on SecurityWeek.

AI Application Security with MCP Server | Contrast MCP Server | Contrast Security

When we introduced the Contrast Model-Context Protocol (MCP) Server a few months ago (read Supercharge your vulnerability remediation with Contrast MCP), the promise was clear: to give AI agents access to the rich security context within the ...

Former US Defense Contractor Executive Admits to Selling Exploits to Russia

Peter Williams stole trade secrets from his US employer and sold them to a Russian cybersecurity tools broker. The post Former US Defense Contractor Executive Admits to Selling Exploits to Russia appeared first on SecurityWeek.

Confluent Private Cloud enables real-time data streaming and governance for regulated industries

Confluent has released Confluent Private Cloud, the simplest way to deploy, manage, and govern streaming data on private infrastructure. The solution addresses the challenge of scaling Apache Kafka on-premises in highly regulated industries by ...

Akeyless introduces AI Agent Identity Security for safer AI operations

Akeylesshas released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems. AI Agent identity crisis More than 95% of organizations are planning to adopt and use AI agents in the next 12 months. The surge ...

New OpenText capabilities enhance enterprise defense with AI across identity, data, and apps

OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale. OpenText Cybersecurity unifies defenses across identity, data, applications, ...

StrongestLayer launches AI Advisor to verify unknown senders in real time

StrongestLayer has launched AI Advisor, an inbox-native security assistant designed to verify first-time senders and unknown contacts in real time. The Outlook and Gmail plugin provides instant, AI-powered analysis for any email that raises ...

How neighbors could spy on smart homes

Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any ...

How the City of Toronto embeds security across governance and operations

In this Help Net Security interview, Andree Noel, Deputy CISO at City of Toronto, discusses how the municipality strengthens its cyber defense by embedding security into strategic objectives and digital governance. She outlines the City’s ...

Your photo could be all AI needs to clone your voice

A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this possibility, testing how well deepfake detectors perform against FOICE ...

Hottest cybersecurity open-source tools of the month: October 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed ...

Email breaches are the silent killers of business growth

78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and ...