Application Security News and Articles


Webinar: Cloud security made easy with CIS Hardened Images

This webinar is designed for leadership and management professionals looking to enhance their organization’s security posture in the cloud. The authors explore CIS Hardened Images: how they work, the security benefits they offer, and why ...

Secure mobile applications with Dart, Flutter, and Sonatype

The Dart coding language and the Flutter framework architecture are gaining traction among developers looking to build fast, reliable, cross-platform applications. The post Secure mobile applications with Dart, Flutter, and Sonatype appeared ...

Swimlane Raises $45 Million for Security Automation Platform

Swimlane has raised $45 million in a growth funding round to fuel its global channel expansion and product innovation. The post Swimlane Raises $45 Million for Security Automation Platform appeared first on SecurityWeek.

AU10TIX AnyDoc Authentication identifies tampered or forged documents

AU10TIX is enhancing its product suite with the launch of AnyDoc Authentication, a capability that exposes forged, tampered, or synthetic non-ID documents that may bypass traditional identity verification methods. AnyDoc harnesses advanced AI, ...

NEW! Classroom Manager With OneRoster® Integration

Saving Time for Tech Teams and Teachers—Securely We’re excited to announce that Classroom Manager is now officially 1EdTech Certified for OneRoster® integration! This is an important milestone in our mission to help K-12 schools simplify ...

Why Traditional Email Filters Aren’t Enough to Stop Phishing in K–12

How to stop phishing in K-12 using artificial intelligence Phishing is one of the most common—and most damaging—cybersecurity threats facing K–12 schools today. And yet, many districts still rely on basic, built-in email filters as their ...

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions. The post Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud appeared first on SecurityWeek.

Low-Code, High Stakes: Why Security Can’t Be an Afterthought for Customers Using Salesforce Industry Clouds

New research reveals critical security flaws in Salesforce industry clouds. Discover the risks and how to protect your organization now. The post Low-Code, High Stakes: Why Security Can’t Be an Afterthought for Customers Using Salesforce ...

New Research on Salesforce Industry Clouds: 0-days, Insecure Defaults, and Exploitable Misconfigurations

AppOmni’s latest research reveals 20+ OmniStudio security flaws, including 5 CVEs affecting Salesforce industry clouds. Learn how misconfigurations expose sensitive data and how to secure your org. The post New Research on Salesforce Industry ...

Critical Vulnerability Patched in SAP NetWeaver

SAP has fixed a critical NetWeaver vulnerability allowing attackers to bypass authorization checks and escalate their privileges. The post Critical Vulnerability Patched in SAP NetWeaver appeared first on SecurityWeek.

Sensitive Information Stolen in Sensata Ransomware Attack

Sensor manufacturer Sensata said a ransomware group had access to its network for more than a week and stole personal information. The post Sensitive Information Stolen in Sensata Ransomware Attack appeared first on SecurityWeek.

Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)

Two Mirai botnets are exploiting a critical remote code execution vulnerability (CVE-2025-24016) in the open-source Wazuh XDR/SIEM platform, Akamai researchers have warned. What is Wazuh? Wazuh is a popular open-source security information and ...

Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Exploitation of a critical-severity RCE vulnerability in Roundcube started only days after a patch was released. The post Exploited Vulnerability Impacts Over 80,000 Roundcube Servers appeared first on SecurityWeek.

How Security Teams Can Scale Safely With Agentic AI

I’ve seen firsthand how quickly cybersecurity can evolve. The scope grows with every new platform, integration and compliance requirement. Threats move faster, data multiplies and expectations continue to rise, even when teams stay the same ...

Vulnerabilities Exposed Phone Number of Any Google User

Google has awarded $5,000 to a researcher who found security holes that enabled brute-forcing the phone number of any user.  The post Vulnerabilities Exposed Phone Number of Any Google User appeared first on SecurityWeek.

Feel the FOMO: Unlocking the Future of GRC Automation

If you’ve been around the governance, risk and compliance (GRC) space for a while, you likely remember the days when GRC workflows involved manually collecting screenshots from several systems, filling out control statuses in spreadsheets and ...

Navigating Data Security Challenges in Cloud Computing for Universities

While the cloud is generally more secure than on-premise deployments, it is not immune to vulnerabilities. The post Navigating Data Security Challenges in Cloud Computing for Universities appeared first on Security Boulevard.

Cymulate streamlines threat detection with AI-powered detection engineering assistant

Cymulate releaseed AI-powered detection engineering assistant for security information and event management (SIEM) rule threat coverage validation. Now, the Cymulate Platform automates and streamlines the detection engineering process for blue ...

Thales File Activity Monitoring enhances enterprise control over unstructured data

Thales launched Thales File Activity Monitoring, a new capability within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real ...

Whole Foods Distributor United Natural Foods Hit by Cyberattack

United Natural Foods has taken some systems offline after detecting unauthorized activity on its IT systems, causing disruptions to operations. The post Whole Foods Distributor United Natural Foods Hit by Cyberattack appeared first on SecurityWeek.