Application Security News and Articles


Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT

The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure.  The post Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT ...

Intruder launches GregAI to deliver AI-powered, contextual security workflow management

Intruder has launched GregAI, an AI-powered security analyst that offers comprehensive visibility into users’ security infrastructure, now available in beta. Unlike generic AI assistants, GregAI integrates directly with data from Intruder’s ...

Sploitlight: macOS Vulnerability Leaks Sensitive Information

The TCC bypass could expose information cached by Apple Intelligence, including geolocation and biometric data. The post Sploitlight: macOS Vulnerability Leaks Sensitive Information appeared first on SecurityWeek.

Dropzone AI Raises $37 Million for Autonomous SOC Analyst

Dropzone AI has announced a Series B funding round led by Theory Ventures to boost its AI SOC solution.  The post Dropzone AI Raises $37 Million for Autonomous SOC Analyst appeared first on SecurityWeek.

From Ex Machina to Exfiltration: When AI Gets Too Curious

From prompt injection to emergent behavior, today’s curious AI models are quietly breaching trust boundaries. The post From Ex Machina to Exfiltration: When AI Gets Too Curious appeared first on SecurityWeek.

Cyware expands Intelligence Suite to streamline CTI program deployment and operations

Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat ...

Is Pydantic as safe as It Is popular?

If you want to keep complexity low and minimize security risks, you always need to decide whether using an external Python library is the…Continue reading on Medium »

Organizations Warned of Exploited PaperCut Flaw

Threat actors are exploiting a two-year-old vulnerability in PaperCut that allows them to execute arbitrary code remotely. The post Organizations Warned of Exploited PaperCut Flaw appeared first on SecurityWeek.

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance

Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges legacy vendors face in preventing data breaches and ensuring regulatory compliance. Databases are ...

Fable Security Raises $31 Million for Human Risk Management Platform

Fable Security has emerged from stealth mode with a solution designed to detect risky behaviors and educate employees. The post Fable Security Raises $31 Million for Human Risk Management Platform appeared first on SecurityWeek.

Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis

Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious. The service uses a network of peer-to-peer nodes that collaboratively deconstruct ...

Aanchal Gupta Joins Adobe as Chief Security Officer

Aanchal Gupta has been named CSO at Adobe after holding cybersecurity leadership roles at Microsoft for more than five years. The post Aanchal Gupta Joins Adobe as Chief Security Officer appeared first on SecurityWeek.

Why behavioral intelligence is becoming the bank fraud team’s best friend

In this Help Net Security interview, Seth Ruden, Senior Director of Global Advisory at BioCatch, discusses how financial institutions are addressing fraud. He explains how banks are using behavioral biometrics, device fingerprinting, and network ...

Ransomware will thrive until we change our strategy

We have reached a stage where ransomware isn’t simply a cybercrime issue: it is now clearly a business disruptor, a threat to societal trust, and increasingly, a national security crisis. As James Babbage, Director General (Threats) at the ...

The final frontier of cybersecurity is now in space

As the space sector becomes more commercial and military-focused, these assets are becoming attractive targets. The global space economy is booming and is expected to increase from $630 billion in 2023 to $1.8 trillion by 2035. This means the ...

Inside the application security crisis no one wants to talk about

Despite knowing the risks, most organizations are still shipping insecure software. That’s one of the stark findings from Cypress Data Defense’s 2025 State of Application Security report, which reveals a worsening crisis in software security. ...

Cybersecurity jobs available right now: July 29, 2025

Cyber Incident Responder Accenture | Ireland | Hybrid – View job details As a Cyber Incident Responder, you will identify and investigate intrusions to determine the cause and extent of the breach, by leveraging EDR, SIEM, and ...

Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI

Deepfakes are causing security problems for governments, businesses and individuals and making trust the most valuable currency of the digital age. The post Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even ...

Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights

Ukrainian and Belarusian hacker groups, which oppose the rule of Belarusian President Alexander Lukashenko, claimed responsibility for the cyberattack. The post Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 ...

Nile Gives Your Campus Network More Than Just a Password

For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once ...