Application Security News and Articles


The Compliance Automation Revolution 2025

In 2025, compliance is no longer a box-ticking exercise — it’s a strategic business imperative. With new regulations like the EU’s NIS2 Directive, DORA for financial services, CMMC 2.0 for U.S. defense, and the Australian Privacy Act 2024, ...

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Over 20 advisories have been published by industrial giants this Patch Tuesday. The post ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact appeared first on SecurityWeek.

Apple’s Bug Bounty Program

Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website: Today we’re announcing the next major chapter for Apple Security Bounty, featuring the industry’s highest rewards, expanded research categories, and ...

The Real Cost of Security Fatigue and How CTEM Brings It Down

Security fatigue is becoming one of the most overlooked challenges in cybersecurity today. A recent report by Sophos found that 85% of cybersecurity and IT professionals in the Asia-Pacific region... The post The Real Cost of Security Fatigue and ...

Microsoft patches three zero-days actively exploited by attackers

On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827. The actively exploited vulnerabilities are an unusual mix ...

Boost AI Risk Management With AI Risk Quantification | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Boost AI Risk Management With AI Risk Quantification | Kovrr appeared first on Security Boulevard.

Roll your own bot detection: server-side detection (part 2)

This is the second part of our series on building a lightweight, vendor-free anti-bot system to protect your login endpoint. In Part 1, we focused on the client side: we designed a fingerprinting script that collects various signals from the ...

Aura enhancements simplify opt-outs and strengthen online privacy

Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of ...

Inside the CISO Mind: How Security Leaders Choose Solutions

Understanding how CISOs navigate noise, trust peers, and make buying decisions The post Inside the CISO Mind: How Security Leaders Choose Solutions appeared first on Security Boulevard.

BigID introduces MCP Server to unlock AI-native access to enterprise data

BigID announced the launch of its Model Context Protocol (MCP) server, designed to unlock AI-native access to enterprise data context across the broadest range of data sources — structured, unstructured, on-prem, cloud, business applications, ...

BarracudaONE adds AI-powered tools to help MSPs simplify security

Barracuda Networks unveiled enhancements to its AI-powered BarracudaONE platform. New capabilities, including bulk remediation for email threats, PSA integrations for automated billing and invoicing, and streamlined account management, are ...

New Cranium AI features enhance compliance, security, and agentic AI scalability

Cranium AI released several new agentic AI capabilities and featured releases to its AI Governance and Security Platform. These new products and capabilities are designed to enable enterprises to scale faster with AI agents, streamline compliance ...

Netcraft launches Phone Scam Disruption to stop brand impersonation calls and texts

Netcraft unveiled a new solution to help protect organizations’ customers from scam texts and phone calls that impersonate their brand. Netcraft’s Phone Scam Disruption automates the detection and takedown of fraudulent phone numbers ...

Red Hat AI 3 helps enterprises scale AI workloads across hybrid environments

Red Hat released Red Hat AI 3, an evolution of its enterprise AI platform. Bringing together the latest innovations from Red Hat AI Inference Server, Red Hat Enterprise Linux AI (RHEL AI), and Red Hat OpenShift AI, the platform simplifies the ...

High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Fortinet and Ivanti have announced their October 2025 Patch Tuesday updates, which patch many vulnerabilities across their products.  The post High-Severity Vulnerabilities Patched by Fortinet and Ivanti appeared first on SecurityWeek.

RGS IC Cloud Support enables Kubernetes management in restricted cloud environments

Rancher Government Solutions (RGS) announced the launch and general availability of IC Cloud Support, a new capability purpose-built for government and military teams operating in classified cloud environments. IC Cloud Support allows ...

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots

Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow data. This new capability addresses critical challenges facing security ...

U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam

The U.S. government has seized about $15 billion worth of Bitcoin connected to what prosecutors call one of the largest cryptocurrency fraud and human trafficking operations ever uncovered. Federal prosecutors in Brooklyn have charged Chen Zhi, ...

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks

Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams to detect, triage, and take down brand and executive threats across social media and the open, deep, and ...

New Jscrambler AI Assistant accelerates PCI DSS compliance decisions

Jscrambler announced the AI Assistant for PCI DSS script authorization workflows, which delivers context-rich insights and expert recommendations to enable prompt and confident script authorization decisions and justifications. PCI DSS v4 ...