Application Security News and Articles


AI adoption is booming but secure scaling not so much

96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly ...

Buy Now, Pay Later… with your data

Buy Now, Pay Later (BNPL) apps are everywhere these days. Whether you’re buying sneakers or groceries, chances are you’ve seen the option to split your payments over time. It’s quick and easy. But behind the convenience is a growing privacy ...

New infosec products of the week: July 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from At-Bay, Immersive, NETSCOUT, Socure, and Stellar Cyber. Stellar Cyber 6.0.0 enhances automation, workflow intelligence, and user experience The 6.0.0 ...

Emerging Cloaking-as-a-Service Offerings are Changing Phishing Landscape

Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing or other malicious site to targets and harmless ones to detection and blocking tools, techniques that SlashNext ...

1Password Adds MCP Server to Trelica Governance Platform

1Password this week announced it has added a Model Context Protocol (MCP) server to the Trelica governance platform for software-as-a-service (SaaS) applications it acquired earlier this year. In addition, the MCP Server for Trelica by 1Password ...

Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing

Researchers discovered a security flaw in Google's Gemini AI chatbot that could put the 2 billion Gmail users in danger of being victims of an indirect prompt injection attack, which could lead to credentials being stolen or phishing attacks. The ...

Empirical Security Raises $12 Million for AI-Driven Vulnerability Management

Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform.  The post Empirical Security Raises $12 Million for AI-Driven Vulnerability Management appeared first on SecurityWeek.

SquareX Collaborates with Top Fortune 500 CISOs to Launch The Browser Security Field Manual at Black Hat

Palo Alto, California, 17th July 2025, CyberNewsWire The post SquareX Collaborates with Top Fortune 500 CISOs to Launch The Browser Security Field Manual at Black Hat appeared first on Security Boulevard.

Armenian Man Extradited to US Over Ryuk Ransomware Attacks

Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation. The post Armenian Man Extradited to US Over Ryuk Ransomware Attacks appeared first on SecurityWeek.

Stellar Cyber enhances identity security with ITDR capabilities

At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform. See Identity Threat Detection & ...

Mobile Forensics Tool Used by Chinese Law Enforcement Dissected

Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location. The post Mobile Forensics Tool Used by Chinese Law Enforcement Dissected appeared first on SecurityWeek.

Are We Truly Prepared for the Era of Quantum Computing?

Although there are many positives to new QC technology, we can’t ignore the fact that we’re entering an era of quantum computing that brings some serious cybersecurity threats. The post Are We Truly Prepared for the Era of Quantum Computing? ...

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations

An $8 billion class action investors’ lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm. The post Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook ...

Collaboration is Key: How to Make Threat Intelligence Work for Your Organization  

Secure threat intelligence sharing reduces risk, accelerates response and builds resilience across entire ecosystems. The post Collaboration is Key: How to Make Threat Intelligence Work for Your Organization   appeared first on Security Boulevard.

Review: Passwork 7.0, self-hosted password manager for business

Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call “the age of innocence,” we scribbled passwords on paper or reused “password123” across five different ...

VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Four CVEs disclosed at the Pwn2Own Berlin 2025 hacking competition have been patched in VMware products. The post VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched appeared first on SecurityWeek.

I Hacked (Logged) In Through The Front Door 

Identity-based attacks have become the path of least resistance and it is the responsibility of all organizations to shore up their defenses to mitigate these threats. The post I Hacked (Logged) In Through The Front Door  appeared first on ...

Cisco Patches Another Critical ISE Vulnerability

Cisco has released patches for multiple vulnerabilities, including a critical flaw in Cisco ISE that leads to remote code execution (RCE). The post Cisco Patches Another Critical ISE Vulnerability appeared first on SecurityWeek.

Oracle Patches 200 Vulnerabilities With July 2025 CPU

Oracle’s July 2025 Critical Patch Update contains 309 security patches that address approximately 200 unique CVEs. The post Oracle Patches 200 Vulnerabilities With July 2025 CPU appeared first on SecurityWeek.

Socure Workforce Verification detects manipulated or fabricated identities

Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure’s Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting ...