Application Security News and Articles


Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities 

The new product is called CodeMender and it can rewrite vulnerable code to prevent future exploits.  The post Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  appeared first on SecurityWeek.

Researchers uncover ClickFix-themed phishing kit

Palo Alto Networks researchers have discovered and analyzed “IUAM ClickFix Generator”, a phishing kit that allows less skilled attackers to infect unsuspecting users with malware by using the increasingly popular ClickFix social ...

We Raised $15M to Build the Future of Security Data

We’re excited to share that Realm Security has raised a $15M Series A, just 12 months after our $5M seed round. We wouldn’t be here without our customers, our team, and our partners. Thank you for believing in what we’re building and for ...

Google Offers Up to $20,000 in New AI Bug Bounty Program

The company has updated the program’s scope and has combined the rewards for abuse and security issues into a single table. The post Google Offers Up to $20,000 in New AI Bug Bounty Program appeared first on SecurityWeek.

Salesforce Refuses to Pay Ransom to Data-Stealing Hackers

Salesforce is refusing a demand by the hackers behind that widespread data-stealing attacks on its customers, which threatened to release massive amounts of the data unless the SaaS vendor negotiated a ransom payment. In an email, Salesforce ...

Realm.Security Redefines Security Data Pipelines with AI, Raises $15M to Accelerate Next-Gen SOC Operations

Realm.Security, the company pioneering an AI-native Security Data Pipeline Platform (SDPP), today announced a $15 million Series A funding round led by Jump Capital, with participation from Glasswing Ventures and Accomplice. The post ...

From Bottleneck to Enabler: A New Approach to API Security in the Age of AI

AI adoption has fundamentally redefined the role of APIs. They are no longer just conduits for data; they have become the “AI action plane” for autonomous systems. Every AI workflow, agent, and tool call now rides on an API, exposing a ...

Miggo Security Named a Gartner® Cool Vendor in AI Security

Tel Aviv, Israel, 8th October 2025, CyberNewsWire The post Miggo Security Named a Gartner® Cool Vendor in AI Security appeared first on Security Boulevard.

North Korean hackers stole over $2 billion in cryptocurrency this year

North Korean hackers have stolen more than $2 billion in cryptocurrency in 2025, according to blockchain analytics firm Elliptic, and the year isn’t over yet. Though this year’s record losses are driven largely by the February attack on ...

CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code

Get details on our discovery of a critical vulnerability in GitHub Copilot Chat. The post CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code appeared first on Security Boulevard.

North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025

The hackers are believed to have stolen over $6 billion for the Pyongyang regime, financing its military programs. The post North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 appeared first on SecurityWeek.

Radiflow Unveils New OT Security Platform

Radiflow360 provides enhanced visibility, risk management, and incident response capabilities for mid-sized industrial enterprises.  The post Radiflow Unveils New OT Security Platform appeared first on SecurityWeek.

Ransomware Group Claims Attack on Beer Giant Asahi

The hackers claim the theft of 27 gigabytes of data, including contracts, employee information, and financial documents. The post Ransomware Group Claims Attack on Beer Giant Asahi appeared first on SecurityWeek.

Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape

Check Point’s Q2 2025 Ransomware Report reveals the collapse of major RaaS groups like LockBit and RansomHub, giving rise to a new, fragmented wave of ransomware actors. The post Law Enforcement Pressure is Reshaping the Global Ransomware ...

The Risks of Polywork: Digital Recruitment and Insider Threats

Nisos The Risks of Polywork: Digital Recruitment and Insider Threats Not long ago, the idea of someone holding two full-time jobs at once sounded like an outlier. Now, in the age of remote work... The post The Risks of Polywork: Digital ...

Which Industries Are Most at Risk for DDoS Attacks?

Distributed Denial-of-Service (DDoS) attacks pose a significant threat to companies across various industries. But the risk is not the same for everyone. The DRS Board, the governing body behind the DDoS Resiliency Score (DRS) standard, has ...

DraftKings Warns Users of Credential Stuffing Attacks

Hackers accessed user accounts and compromised names, addresses, phone numbers, email addresses, and other information. The post DraftKings Warns Users of Credential Stuffing Attacks appeared first on SecurityWeek.

Turn Compliance into a Competitive Advantage: How to Scale Privacy-Aligned Services

Learn how MSSPs can transform compliance from a burden into a competitive advantage by scaling privacy-aligned services with DSPM. The post Turn Compliance into a Competitive Advantage: How to Scale Privacy-Aligned Services appeared first on ...

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

Hundreds of internet-exposed Oracle E-Business Suite instances may still be vulnerable to attacks. The post Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching appeared first on SecurityWeek.

Netskope UZTNA adds policy control by device posture, risk, and role

Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope’s UZTNA solution extends beyond the core use case of delivering fast, ...