Application Security News and Articles


Sweet Security Raises $75 Million for Cloud and AI Security

The cybersecurity startup will use the investment to accelerate global expansion and product innovation. The post Sweet Security Raises $75 Million for Cloud and AI Security appeared first on SecurityWeek.

Aryaka advances converged networking and security with Unified SASE as a Service 2.0

Aryaka has announced the launch of Aryaka Unified SASE as a Service 2.0. The new platform incorporates several major new features to accommodate rising AI adoption and the need to secure the hybrid workforce. Aryaka Unified SASE 2.0 ensures that ...

Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Google is targeting the threat group known as Smishing Triad, which used over 194,000 malicious domains in a campaign.  The post Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit appeared first on SecurityWeek.

IBM pushes toward quantum advantage by 2026 with new Nighthawk processor

IBM is taking another major step toward its goal of achieving quantum advantage by 2026 and fault-tolerant quantum computing by 2029, unveiling its most advanced quantum processor yet, IBM Quantum Nighthawk. IBM Quantum Nighthawk processor The ...

The Learning Counsel: 3 Steps to a Robust Zero-Trust Architecture in K-12 Schools This Year

This article was originally published in The Learning Counsel on 11/5/25 by Charlie Sander. It’s time for district leaders to turn your attention to cybersecurity strategy As the buzz around back-to-school season subsides and teachers and ...

High-Severity Vulnerabilities Patched by Ivanti and Zoom

Ivanti and Zoom resolved security defects that could lead to arbitrary file writes, elevation of privilege, code execution, and information disclosure. The post High-Severity Vulnerabilities Patched by Ivanti and Zoom appeared first on SecurityWeek.

On Hacking Back

Former DoJ attorney John Carlin writes about hackback, which he defines thus: “A hack back is a type of cyber response that incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. ...

Google Paid Out $458,000 at Live Hacking Event

Researchers submitted 107 bug reports during the bugSWAT hacking event at the ESCAL8 conference in New Mexico. The post Google Paid Out $458,000 at Live Hacking Event appeared first on SecurityWeek.

Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)

Microsoft has delivered a rather light load of patches for November 2025 Patch Tuesday: some 60+ vulnerabilities have received a fix, among them an actively exploited Windows Kernel flaw (CVE-2025-62215). CVE-2025-62215 CVE-2025-62215 is a memory ...

Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel

Intel, AMD and Nvidia have published security advisories describing vulnerabilities found recently in their products. The post Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel appeared first on SecurityWeek.

Avast delivers AI-powered protection for Android and iOS

Avast launched Scam Guardian and Scam Guardian Pro for mobile devices. Building on the desktop product, this mobile expansion brings in AI-powered scam protection directly to people’s smartphones and tablets. Scam Guardian is available at ...

Why we should start code signing LLM models

As AI models move from the cloud to edge devices, the risk of tampering grows. Unsigned language models can be manipulated, threatening integrity and trust. It’s time to apply code-signing principles to AI models because the machines are ...

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider

An Aveva vulnerability also impacts Schneider Electric products and both vendors have published advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider appeared first on SecurityWeek.

NSFOCUS Monthly APT Insights – September 2025

Regional APT Threat Situation In September 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, as shown in the ...

When every day is threat assessment day

In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and ...

Bringing AI to the SOC is not Intended to Replace Humans 

Learn how to transform your traditional SOC into an AI-powered security hub with multi-agent collaboration, contextual intelligence, and business risk–driven insights. The post Bringing AI to the SOC is not Intended to Replace Humans  appeared ...

The Future of AI in Security: From Reactive to Proactive Protection 

Explore how AI is transforming cybersecurity from reactive threat response to proactive, predictive protection — while addressing ethics, privacy, and the human-AI balance. The post The Future of AI in Security: From Reactive to Proactive ...

Autonomous AI could challenge how we define criminal behavior

Whether we ever build AI that thinks like a person is still uncertain. What seems more realistic is a future with more independent machines. These systems already work across many industries and digital environments. Alongside human-to-human and ...

ProxyBridge: Open-source proxy routing for Windows applications

ProxyBridge is a lightweight, open-source tool that lets Windows users route network traffic from specific applications through SOCKS5 or HTTP proxies. It can redirect both TCP and UDP traffic and gives users the option to route, block, or allow ...

Shadow AI risk: Navigating the growing threat of ungoverned AI adoption

AI is transforming how businesses operate, but it’s also creating new, often hidden risks. As employees and business units eagerly embrace and experiment with AI solutions, many organizations are losing control over where and how AI is being ...