Application Security News and Articles
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.
Artificial Intelligence is no longer on the ...
Creators/Authors/Presenters: Ashish Rajan, Jackie Bow, Kane Narraway
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...
Trend Micro has rushed to fix two Apex One zero-days that may have been exploited by Chinese threat actors.
The post Trend Micro Patches Apex One Vulnerabilities Exploited in Wild appeared first on SecurityWeek.
Sysdig, this week at the Black Hat USA 2025 conference, revealed it is providing early access to artificial intelligence (AI) agents that have been added to its cloud native application protection platform (CNAPP).
The post Sysdig Previews Set of ...
Master login security with expert insights from building identity systems serving millions of users. This comprehensive guide covers password managers, two-factor authentication, phishing protection, Wi-Fi security, and advanced strategies to ...
Kubernetes has come a long way, from early pain points around cluster upgrades to more streamlined processes enforced by managed cloud providers. But one area still lagging behind in maturity, security, and operational best practices? ...
Microsoft handed out $17 million in rewards to 344 security researchers through its bug bounty programs over the past year.
The post Microsoft Paid Out $17 Million in Bug Bounties in Past Year appeared first on SecurityWeek.
Abnormal AI updated Security Posture Management product, bringing AI-driven protection, automated prioritization, and remediation guidance to customers’ Microsoft 365 environments. As Microsoft 365 environments become more complex, accidental ...
An AI extension to the Ox Security platform automatically generates organization specific code to fix vulnerabilities in the codebase.
The post Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities appeared first on ...
Adobe has released an emergency security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE), which fix two critical vulnerabilities (CVE-2025-54253, CVE-2025-54254) with a publicly available proof-of-concept (PoC) exploit. ...
Proxmox Virtual Environment (VE) 9.0 introduces advancements in both storage and networking capabilities, addressing critical enterprise demands. A highlight is the long-awaited support for snapshots on thick-provisioned LVM shared storage, ...
DaVita has notified over 1 million individuals that their personal and health information was stolen in a ransomware attack.
The post Over 1 Million Impacted by DaVita Data Breach appeared first on SecurityWeek.
The Black Hat Conference has always been a harbinger of where security is headed next. This year, predictably, the conversation is dominated by AI — AI-enhanced threats, AI-driven defenses, AI-this, AI-that. But amid all the artificial ...
SpyCloud has introduced enhancements to its SaaS Investigations solution, integrating advanced AI-powered insights that mirror the tradecraft of SpyCloud’s seasoned investigators. Building on the foundation of its IDLink identity analytics, ...
Unauthenticated command injection vulnerabilities (CVE-2025-54948, CVE-2025-54987) affecting the on-premise version of Trend Micro’s Apex One endpoint security platform are being probed by attackers, the company has warned on Wednesday. ...
ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login bypass.
The post Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass appeared first on SecurityWeek.
Descope launched Agentic Identity Control Plane, a solution that enables security teams to institute policy-based governance, auditing, and identity management for their AI agent and Model Context Protocol (MCP) ecosystems. The Agentic Identity ...
MIND announced the general availability of the first autonomous DLP platform, enabling security teams to safely use GenAI, go beyond compliance, and automate data protection across all IT environments by reducing manual work and preventing ...
Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors are most vulnerable to specific threat actors before threats escalate into breaches. “With high-profile ...
Explore the top IAM platforms with MojoAuth. Ensure secure access and protect your enterprise with advanced identity and access management solutions.
The post Top IAM Platforms for Secure Access | MojoAuth appeared first on Security Boulevard.