Application Security News and Articles


Leveraging AI to Stay Ahead in Cybersecurity: A Conversation with Chandra Pandey and Joshua Skeens, CEO of Logically 

At Seceon’s 2025 Q1 Innovation and Certification Days, Seceon CEO Chandra Pandey and Joshua Skeens, CEO of Seceon’s partner Logically (www.logically.com) engaged in an insightful discussion about AI’s transformative role in cybersecurity. ...

Cybercriminals shift focus to social media as attacks reach historic highs

A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked – an astonishing rate of 321 per second. The risk of ...

DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught

Authors/Presenters: Tim Chase Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Learn & Avoid Social Engineering Scams in 2025

In the past decade, social engineering attacks have become more sophisticated and prevalent than ever. From AI voice impersonation to deepfake video calls, cybercriminals are leveraging the latest technology to make their scams increasingly ...

Unit21 empowers financial institutions to detect and stop scams

Unit21 launched its new scams solution that helps financial institutions and fintechs detect and stop scams before they cause financial harm. Using AI automation, the new solution can be integrated into a fraud team’s workflow to accelerate ...

Inside Amazon GuardDuty: What the Logs Reveal About Cloud Security 

Amazon GuardDuty is often referred to as the security hub of Amazon’s cloud ecosystem. It provides advanced threat detection by analyzing run-time (OS-level) activities, network traffic logs, and security events. Amazon describes it as “a ...

Boomi API Management helps enterprises tackle API sprawl

Boomi unveiled its API Management (APIM) solution, delivering cloud-scale APIM alongside integration and automation, data management, and AI capabilities as part of the Boomi Enterprise Platform. Comprised of Boomi’s existing API Management ...

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

London, United Kingdom, 18th February 2025, CyberNewsWire The post Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions appeared first on Security Boulevard.

Cybersecurity in 2025: AI, Attack Surfaces and the Shift to Cyber Resilience

Hello, I’m Krista Case, research director on the team here at The Futurum Group. I’m here today to walk you through three of the key trends that we’re going to be watching in the cybersecurity space. The first topic is the fact ...

Cybersecurity Predictions for 2025: Platforms, Convergence and the Future of Risk Management

Hello, I’m Fernando Montenegro and I recently joined Futurum Research as Vice President and Practice Lead for Cybersecurity Research. You may have seen the video from my colleague Krista Case, so this is a bit of a complement to that. I ...

GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies

Ransomware threats continue evolving, with the most successful groups refining their tactics to maximize impact over the last year. Understanding […] The post GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies appeared first on ...

Finastra Starts Notifying People Impacted by Recent Data Breach

Financial software firm Finastra is notifying individuals whose personal information was stolen in a recent data breach. The post Finastra Starts Notifying People Impacted by Recent Data Breach appeared first on SecurityWeek.

Critical Vulnerability Patched in Juniper Session Smart Router

A critical vulnerability tracked as CVE-2025-21589 has been patched in Juniper Networks’ Session Smart Router. The post Critical Vulnerability Patched in Juniper Session Smart Router appeared first on SecurityWeek.

Secure AI deployment is complicated: 5 ways to get your ducks in a row

The practical and secure implementation of artificial intelligence systems within organizations — starting with the exploration of tools, applications, supply chains, and other components necessary to deploy AI successfully — is the focus of ...

Singulr Launches With $10M in Funding for AI Security and Governance Platform

Singulr AI announced its launch with $10 million in seed funding raised for an enterprise AI security and governance platform.  The post Singulr Launches With $10M in Funding for AI Security and Governance Platform appeared first on SecurityWeek.

Golang Backdoor Abuses Telegram for C&C Communication

A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server. The post Golang Backdoor Abuses Telegram for C&C Communication appeared first on SecurityWeek.

ProcessUnity accelerates third-party assessments

ProcessUnity announced the next generation of the Global Risk Exchange. This platform transforms the third-party assessment process, reducing friction for both organizations and their third parties while streamlining vendor onboarding and ...

Predicting the year of cybersecurity ahead (minus regulations)

S04 EP 02: Common themes we can expect to see in 2025 The post Predicting the year of cybersecurity ahead (minus regulations) appeared first on Security Boulevard.

Microsoft Warns of Improved XCSSET macOS Malware

Microsoft has observed a new variant of the XCSSET malware being used in limited attacks against macOS users. The post Microsoft Warns of Improved XCSSET macOS Malware appeared first on SecurityWeek.

Palo Alto Networks Confirms Exploitation of Firewall Vulnerability

Palo Alto Networks has confirmed that a recently patched firewall vulnerability tracked as CVE-2025-0108 is being actively exploited. The post Palo Alto Networks Confirms Exploitation of Firewall Vulnerability appeared first on SecurityWeek.