Application Security News and Articles


U.S. Secret Service takes down network of devices threatening government officials

The U.S. Secret Service has broken up a network of electronic devices spread across the New York tristate area that officials say posed an imminent threat to national security. The devices were being used to launch telecommunications attacks and ...

Outpost24 launches pen testing packages for mobile apps and APIs

Outpost24 launched new pen test reporting, giving customers a consolidated view of all penetration testing results within a single platform. This eliminates the need to manage multiple reports from different sources, saving time and improving ...

SonicWall adds rootkit removal capabilities to the SMA 100 series

SonicWall has released new firmware for its Secure Mobile Access (SMA) 100 series appliances, adding file-checking capabilities that help users remove known rootkit malware. The malware in question is the OVERSTEP user-mode rootkit, deployed by ...

Java Security Starts with the JVM

The first stop on the road to Java security should be the JVM. Outdated, unpatched, or unsupported Java runtimes carry unnecessary risks. The post Java Security Starts with the JVM appeared first on Azul | Better Java Performance, Superior ...

Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

The company will expand its platform’s capabilities and accelerate investigative collaboration and go-to-market efforts. The post Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests  appeared first on SecurityWeek.

How Webb City School District Improved Google Security and Safety Without Adding Costs

Systems Engineer shares how Cloud Monitor streamlines investigations, secures PII, and provides peace of mind without increasing his budget Webb City School District in Missouri serves approximately 4,500 students and employs around 500 staff ...

Dragos Platform 3.0 consolidates risk alerts and streamlines industrial cybersecurity

Dragos released Dragos Platform 3.0, providing capabilities that enable industrial defenders to act faster and more confidently against intensifying cyber threats. The Dragos Platform’s new Insights Hub consolidates risk-based ...

SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist

Austin, Texas, USA, 23rd September 2025, CyberNewsWire The post SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist appeared first on Security Boulevard.

All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher

The strength of responsible disclosure is that it can solve problems before they are actioned. The weakness is that it potentially generates a false sense of security in the vendor. The post All Microsoft Entra Tenants Were Exposed to Silent ...

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

A new ranking of Model Context Protocol weaknesses highlights critical risks—from prompt injection to command injection—and provides a roadmap for securing the foundations of agentic AI. The post Top 25 MCP Vulnerabilities Reveal How AI ...

Apple’s New Memory Integrity Enforcement

Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use to get unauthorized system access. From ...

ShadowV2 DDoS Service Lets Customers Self-Manage Attacks

The botnet’s operators provide customers with access to an infected network of Docker containers so they can conduct DDoS attacks. The post ShadowV2 DDoS Service Lets Customers Self-Manage Attacks appeared first on SecurityWeek.

Scattered Spider Suspect Arrested in US

The juvenile suspect surrendered on September 17 and was booked on computer intrusion, extortion, and identity theft charges. The post Scattered Spider Suspect Arrested in US appeared first on SecurityWeek.

Why Strong Search Engine and AI Visibility Depends on Strong Security 

SEO and cybersecurity are now inseparable. Learn how site performance, trust signals, and attack surface management impact rankings and digital trust. The post Why Strong Search Engine and AI Visibility Depends on Strong Security  appeared first ...

Why Modern SaaS Platforms Depend on Contextual Data

Discover how contextual data like time, location, and device transforms SaaS platforms, enabling personalized, intuitive, and adaptive user experiences. The post Why Modern SaaS Platforms Depend on Contextual Data appeared first on Security ...

Enterprise Security and Digital Transformation in 2025 Navigating Risks and Opportunities

Explore how enterprise security aligns with digital transformation in 2025, leveraging AI, cloud, and risk management for resilient growth. The post Enterprise Security and Digital Transformation in 2025 Navigating Risks and Opportunities ...

Back to School Means Back to Breaches

Cybercriminals are increasingly targeting schools and universities. Learn how students, parents, and educators can strengthen cybersecurity defenses. The post Back to School Means Back to Breaches appeared first on Security Boulevard.

Automotive Titan Stellantis Discloses Data Breach

The company says customer contact information was stolen from a third-party service provider’s platform. The post Automotive Titan Stellantis Discloses Data Breach appeared first on SecurityWeek.

Building SaaS Features for Enterprise Readiness

Make your SaaS enterprise-ready! Learn how to build essential features like SSO, SAML, OIDC, and achieve SOC 2 compliance for security and scalability. The post Building SaaS Features for Enterprise Readiness appeared first on Security Boulevard.

Driving Meaningful Success for Enterprise Security Initiatives

Learn how to drive meaningful success for enterprise security initiatives using SSO and CIAM. Align security with business goals, implement effective strategies, and measure impact. The post Driving Meaningful Success for Enterprise Security ...