Application Security News and Articles
Frost & Sullivan honors AppOmni for excellence in SaaS Security Posture Management, recognizing its innovation, scale, and customer impact.
The post AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition ...
AppOmni is named Growth & Innovation Leader in 2025 Frost Radar™ for SSPM and awarded with Tech Innovation Recognition by Frost & Sullivan.
The post AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security ...
Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers. An out-of-band update Last week’s release of an emergency fix for CVE-2025-59287, a ...
Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.
The post Major US Telecom Backbone Firm Hacked by Nation-State Actors appeared first on SecurityWeek.
Silver Spring, USA/ Maryland, 30th October 2025, CyberNewsWire
The post Aembit Introduces Identity and Access Management for Agentic AI appeared first on Security Boulevard.
RepoFlow was created with a clear goal: to provide a simple package management alternative that just works without the need for teams to manage or maintain it. Many existing solutions required constant setup, tuning, and oversight. RepoFlow ...
The Canadian Centre for Cyber Security has warned CISOs that hacktivists are increasingly targeting internet-exposed ICS.
The post Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm appeared first on SecurityWeek.
What deems a prospect good or bad for your business?
The post The Correlation Between MSP Growth and Proper Client Prospecting appeared first on Security Boulevard.
The packages deployed malicious code harvesting system information, credentials, tokens, API keys, and other sensitive information.
The post 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times appeared first on SecurityWeek.
When we introduced the Contrast Model-Context Protocol (MCP) Server a few months ago (read Supercharge your vulnerability remediation with Contrast MCP), the promise was clear: to give AI agents access to the rich security context within the ...
Peter Williams stole trade secrets from his US employer and sold them to a Russian cybersecurity tools broker.
The post Former US Defense Contractor Executive Admits to Selling Exploits to Russia appeared first on SecurityWeek.
Confluent has released Confluent Private Cloud, the simplest way to deploy, manage, and govern streaming data on private infrastructure. The solution addresses the challenge of scaling Apache Kafka on-premises in highly regulated industries by ...
Akeylesshas released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems. AI Agent identity crisis More than 95% of organizations are planning to adopt and use AI agents in the next 12 months. The surge ...
OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale. OpenText Cybersecurity unifies defenses across identity, data, applications, ...
StrongestLayer has launched AI Advisor, an inbox-native security assistant designed to verify first-time senders and unknown contacts in real time. The Outlook and Gmail plugin provides instant, AI-powered analysis for any email that raises ...
Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any ...
In this Help Net Security interview, Andree Noel, Deputy CISO at City of Toronto, discusses how the municipality strengthens its cyber defense by embedding security into strategic objectives and digital governance. She outlines the City’s ...
A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this possibility, testing how well deepfake detectors perform against FOICE ...
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed ...
78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and ...