Application Security News and Articles
Cyware has announced the launch of a new Cyware Quarterback AI solution delivering an AI Fabric to address security use cases. Cyware Quarterback AI was initially launched as a Co-pilot chat assistant in March 2024. Since that first release the ...
Executive Summary In 2025, credit unions across the United States stand at the crossroads of survival and collapse in the face of unprecedented cybersecurity challenges. Sophisticated cyber threats, intense regulatory scrutiny, and limited ...
From the evolving role of AI to the realities of cloud risk and governance, the CISO Forum Virtual Summit brings together CISOs, researchers, and innovators to share practical insights and strategies.
The post Virtual Event Today: CISO Forum 2025 ...
Intel is suing a former employee who the chipmaker claims downloaded almost 18,000 corporate files days before leaving the company. The software engineer was told he was being let go effective July 31, likely part of Intel's larger effort to shed ...
The cybersecurity startup will use the investment to accelerate global expansion and product innovation.
The post Sweet Security Raises $75 Million for Cloud and AI Security appeared first on SecurityWeek.
Aryaka has announced the launch of Aryaka Unified SASE as a Service 2.0. The new platform incorporates several major new features to accommodate rising AI adoption and the need to secure the hybrid workforce. Aryaka Unified SASE 2.0 ensures that ...
Google is targeting the threat group known as Smishing Triad, which used over 194,000 malicious domains in a campaign.
The post Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit appeared first on SecurityWeek.
IBM is taking another major step toward its goal of achieving quantum advantage by 2026 and fault-tolerant quantum computing by 2029, unveiling its most advanced quantum processor yet, IBM Quantum Nighthawk. IBM Quantum Nighthawk processor The ...
This article was originally published in The Learning Counsel on 11/5/25 by Charlie Sander. It’s time for district leaders to turn your attention to cybersecurity strategy As the buzz around back-to-school season subsides and teachers and ...
Ivanti and Zoom resolved security defects that could lead to arbitrary file writes, elevation of privilege, code execution, and information disclosure.
The post High-Severity Vulnerabilities Patched by Ivanti and Zoom appeared first on SecurityWeek.
Former DoJ attorney John Carlin writes about hackback, which he defines thus: “A hack back is a type of cyber response that incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. ...
Researchers submitted 107 bug reports during the bugSWAT hacking event at the ESCAL8 conference in New Mexico.
The post Google Paid Out $458,000 at Live Hacking Event appeared first on SecurityWeek.
Microsoft has delivered a rather light load of patches for November 2025 Patch Tuesday: some 60+ vulnerabilities have received a fix, among them an actively exploited Windows Kernel flaw (CVE-2025-62215). CVE-2025-62215 CVE-2025-62215 is a memory ...
Intel, AMD and Nvidia have published security advisories describing vulnerabilities found recently in their products.
The post Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel appeared first on SecurityWeek.
Avast launched Scam Guardian and Scam Guardian Pro for mobile devices. Building on the desktop product, this mobile expansion brings in AI-powered scam protection directly to people’s smartphones and tablets. Scam Guardian is available at ...
As AI models move from the cloud to edge devices, the risk of tampering grows. Unsigned language models can be manipulated, threatening integrity and trust. It’s time to apply code-signing principles to AI models because the machines are ...
An Aveva vulnerability also impacts Schneider Electric products and both vendors have published advisories.
The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider appeared first on SecurityWeek.
Regional APT Threat Situation In September 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, as shown in the ...
In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and ...
Learn how to transform your traditional SOC into an AI-powered security hub with multi-agent collaboration, contextual intelligence, and business risk–driven insights.
The post Bringing AI to the SOC is not Intended to Replace Humans appeared ...