Application Security News and Articles


Day in the Life: Expanding Sonar into LATAM as a Country Manager

Let's dive in and learn about his drive to expand Sonar's presence in Latin America, what a typical day looks like, and what fuels his passion both in and out of the office. The post Day in the Life: Expanding Sonar into LATAM as a Country ...

Continuous Authorization in Action: Dispersive+CrowdStrike Integration

For an extended period, cybersecurity has been characterized by the isolated operation of sophisticated tools. While endpoint protection, identity solutions, and network security each fulfill their respective functions, a critical vulnerability ...

Operationalizing NIST and MITRE with Autonomous SecOps

How Morpheus brings trusted cybersecurity frameworks to life through automation and intelligence. The post Operationalizing NIST and MITRE with Autonomous SecOps appeared first on D3 Security. The post Operationalizing NIST and MITRE with ...

Configuring an MCP Server with Auth0 as the Authorization Server

4 min readA practical walkthrough of the Auth0 settings and tweaks you’ll need to get an MCP server working smoothly with real-world clients like Claude. The post Configuring an MCP Server with Auth0 as the Authorization Server appeared first ...

What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience

Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows ...

The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity 

The post The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity  appeared first on AI Security Automation. The post The Quality Era: How CISA’s Roadmap Reflects Urgency for Modern Cybersecurity  appeared first on ...

DEF CON 33: Torvik From Tulip Tree Tech

Creators, Authors and Presenters: Silk, Torvik Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas ...

The Hidden War Above: How GPS Jamming Exposes Our Digital Vulnerabilities

Every day, thousands of flights cross the skies above the Baltic Sea. Pilots expect their GPS systems to guide them safely through busy air corridors, just as they have for decades. But since Russia’s invasion of Ukraine in 2022, something ...

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

OpenAI has fixed this zero-click attack method called by researchers ShadowLeak. The post ChatGPT Deep Research Targeted in Server-Side Data Theft Attack appeared first on SecurityWeek.

SonicWall says attackers compromised some firewall configuration backup files

Between attackers exploiting 0-day and n-day vulnerabilities in the company’s firewalls and Secure Mobile Access appliances, SonicWall and its customers have had a tough year. And, unfortunately for them, the troubles are not over: unknown ...

Adversary TTPs are Rapidly Evolving: What It Means for Your SOC

In December 2024, we warned against the rapid evolution of adversary tactics, techniques, and procedures (TTPs) in 2025. Our predictions have come true, as cybercriminals leverage millions of dollars in profits to develop new malware technologies ...

AI Sprawl in SaaS: How to Build a Governance Framework Before It Burns Budget & Credibility

Every SaaS team sprinted to bolt AI into their product stack and the result is not genius, it is a mess. Models are multiplying like...Read More The post AI Sprawl in SaaS: How to Build a Governance Framework Before It Burns Budget & ...

Now Live: Monetize AI Traffic With DataDome & TollBit Integration

The DataDome + TollBit integration is now live. Start detecting, controlling, and monetizing AI traffic on your site in minutes—no dev work required. The post Now Live: Monetize AI Traffic With DataDome & TollBit Integration appeared first ...

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks

Palo Alto, California, 18th September 2025, CyberNewsWire The post Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks appeared first on Security Boulevard.

Use These Security Best Practices for Hardened Containers and Java

When you use hardened containers with a superior Java runtime, you give your development teams a competitive advantage. The post Use These Security Best Practices for Hardened Containers and Java appeared first on Azul | Better Java ...

Deepwatch Named a High Performer in the Grid® Report for System Security by Real Users on G2

Leading AI + human-powered MDR solution recognized by world’s largest software marketplace for delivering exceptional threat detection and response capabilities PALO ALTO – September 18, 2025 – Deepwatch, the leader in precision Managed ...

How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk

Wondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights.  Key takeaways The CISOs who make up the Exposure Management ...

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)

Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its Threat Analysis Group (TAG) on Tuesday. “Google is aware that an exploit for CVE-2025-10585 exists in the ...

LinkedIn now uses your data for AI by default, opt out now!

LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable updates, the company will now use member data by default to improve its generative AI models, unless users manually opt ...

AI in Schools: Pros, Cons, And Benefits For Teachers

If you ask K-12 teachers what they think about artificial intelligence (AI), some express optimism, while others are cautious, even worried. AI is a pressing topic today, and educators are at the center of its development for classroom ...