Application Security News and Articles


Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding

The cybersecurity startup will use the funds to expand its engineering team, extend collaborations, and get ready for enterprise rollout. The post Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding appeared first on SecurityWeek.

Compromised Credential Detection vs. Password Policy Enforcement

Credential detection finds exposed passwords your policy can’t. Learn how continuous credential checks close the security gap. The post Compromised Credential Detection vs. Password Policy Enforcement appeared first on Security Boulevard.

AppOmni Delivers Industry First Real-Time Agentic AI Security for ServiceNow

AppOmni expands SaaS security with AgentGuard and AI Security Posture Management to provide real-time protection, visibility, and posture automation for AI agents in ServiceNow and other SaaS environments. The post AppOmni Delivers Industry First ...

Blocking Traffic Manipulation in AWS Starts With IAM

Tl;DR Networking in the Cloud Without domain name resolution and effective traffic routing, the cloud breaks. This proved true last month, when a DNS issue affecting the AWS us-east-1 DynamoDB API endpoint disrupted operations at thousands of ...

Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign

Threat actors are abusing Ray’s lack of authentication to deploy LLM-generated payloads and cryptocurrency miners. The post Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign appeared first on SecurityWeek.

BigID uses agentic AI to automate privacy and compliance mapping

BigID announced the agentic AI–powered data mapping capability that automates and visualizes personal data flows for privacy and compliance. Agentic Data Mapping strengthens privacy programs with AI-driven automation, helping organizations ...

Automating SaaS Onboarding: Simplifying and Testing Your Enterprise SSO Flows

Discover how to automate SaaS enterprise onboarding by testing SSO flows to ensure seamless, secure, and reliable authentication for your users. The post Automating SaaS Onboarding: Simplifying and Testing Your Enterprise SSO Flows appeared first ...

eSchool News: How K-12 IT Teams Lock Down QR-Based SSO Without Hurting Usability

This article was originally published in eSchool News on 11/10/25 by Charlie Sander. Phishing via QR codes, a tactic now known as “quishing,” involves attackers embedding malicious QR codes in emails or posters Schools can keep QR logins safe ...

Black Kite launches AI Agent to automate third-party risk work

Black Kite announced the release of Black Kite AI Agent, an agent that automatically investigates, assesses, and reports on third-party risk. “Our strong performance validates that our accuracy, scalability, and transparent approach is more ...

The Top 8 Continuous Control Monitoring Solutions

Modern enterprises can no longer rely on point-in-time control testing. Cloud adoption, distributed workforces, and escalating regulatory scrutiny require continuous, evidence-driven visibility into whether controls are functioning as designed. ...

AI Is Supercharging Phishing: Here’s How to Fight Back

AI has given cybercriminals the ability to operate like Fortune‑500‑scale marketing departments—except their product is account takeover, data theft, and identity fraud. The post AI Is Supercharging Phishing: Here’s How to Fight Back ...

Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)

Attackers are actively exploiting another FortiWeb vulnerability (CVE-2025-58034) that Fortinet fixed without making its existence public at the time. About CVE-2025-58034 CVE-2025-58034 is an OS Command Injection flaw caused by improper ...

Sue The Hackers – Google Sues Over Phishing as a Service

Google’s Lighthouse lawsuit signals a new era in cybersecurity, where companies use civil litigation—including the CFAA, Lanham Act, and RICO—to dismantle phishing networks, seize malicious infrastructure, and fight hackers when criminal ...

Largest Azure DDoS Attack Powered by Aisuru Botnet

Microsoft said the DDoS attack was aimed at an endpoint in Australia and reached 15.72 Tbps and 3.64 Bpps. The post Largest Azure DDoS Attack Powered by Aisuru Botnet appeared first on SecurityWeek.

The 2025 MSP Cyber Crisis: Breaking Free From Vendor Lock-In and Reclaiming Profitability

The global MSP ecosystem has entered its most challenging era. As businesses accelerate cloud adoption, hybrid work, and continuous digital operations, MSPs have become essential security partners. Yet despite market growth, the sector is ...

Threat group reroutes software updates through hacked network gear

Sometimes an attack hides in the most ordinary corner of a network. ESET researchers say a China aligned threat group known as PlushDaemon has been quietly using hacked routers to steer software updates toward its own servers. The discovery shows ...

When AI Turns on Its Team: Exploiting Agent-to-Agent Discovery via Prompt Injection

Aaron Costello uncovers how second-order prompt injection turns AI agents against their own systems. He explains how attackers exploit ServiceNow’s Now Assist and offers clear guidance on securing AI collaboration. The post When AI Turns on Its ...

Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

An OS command injection flaw, the exploited zero-day allows attackers to execute arbitrary code on the underlying system. The post Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week appeared first on SecurityWeek.

Sophos adds Intelix threat intelligence to Microsoft Security and 365 Copilot

Sophos announced the general availability of new integrations that connect Sophos Intelix, its cyber threat intelligence repository, with Microsoft Security Copilot and Microsoft 365 Copilot. Organizations of all sizes now gain real-time access ...

Arctic Wolf expands MDR capabilities with Abnormal AI behavioral email intelligence

Arctic Wolf announced a new integration between the Arctic Wolf Aurora Platform and Abnormal AI, expanding detection and response capabilities across one of the most targeted attack surfaces, email. The integration brings Abnormal AI’s ...