Application Security News and Articles


Censys enables security teams to be more proactive in their threat hunting

Censys is launching a new solution specifically designed to enable threat hunting teams to track adversary infrastructure. The Censys’ Threat Hunting solution is part of Censys’ recently released Internet Intelligence platform, which ...

AppOmni Unleashes World’s First SaaS Security Model Context Protocol (MCP) Server For Agentic AI Architectures

Meet the MCP server: AppOmni’s AI-powered leap forward in SaaS security. Learn more to see deeper, react faster, and outsmart threats like never before. The post AppOmni Unleashes World’s First SaaS Security Model Context Protocol (MCP) ...

Exposure Management Works When the CIO and CSO Are in Sync

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO ...

Wallarm Extends API Security Reach to AI Agents

Wallarm at the 2025 RSA Conference announced that, starting this summer, it will extend the reach of its platform for securing application programming interfaces (APIs) to include artificial intelligence (AI) agents. Tim Erlin, vice president of ...

From Spreadsheets to SaaS-Based Cyber Risk Registers | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post From Spreadsheets to SaaS-Based Cyber Risk Registers | Kovrr appeared first on Security Boulevard.

Cybersecurity CEO Charged with Installing Malware on Hospital Computers

Jeffrey Bowie, the CEO of cybersecurity company Veritaco, was seen on security camera footage walking into St. Anthony Hospital in Oklahoma City last year and installing malware on an employee computer. He was arrested this month for violating ...

Abnormal AI improves security awareness training with AI agents

Abnormal AI introduces autonomous AI agents that improve how organizations train employees and report on risk while also evolving its email security capabilities. In a year defined by the explosive use of malicious AI for cybercrime, Abnormal is ...

Avocado OS: Open-source Linux platform for embedded systems

Peridio, a platform for building and maintaining advanced embedded products, has launched Avocado OS, an open-source embedded Linux distribution made to simplify the way developers build complex embedded systems. Avocado OS focuses on delivering ...

4 Million Affected by VeriSource Data Breach

VeriSource Services says the personal information of 4 million people was compromised in a February 2024 cyberattack. The post 4 Million Affected by VeriSource Data Breach appeared first on SecurityWeek.

Flashpoint Ignite enhancements improve threat intelligence

Flashpoint announced new capabilities to its flagship platform, Flashpoint Ignite. These innovations are designed to deliver insights that align with customers’ threat intelligence needs, enabling organizations to make informed decisions ...

Anetac Human Link Pro secures both human and non-human identities

Anetac announced the global rollout of Human Link Pro. This new capability unifies the management of human and non-human identity vulnerabilities within the Anetac Identity Vulnerability Management Platform. Already in use by organizations in ...

Cisco Unveils Open Source AI Reasoning Model for Cybersecurity Use Cases

Cisco today at the 2025 RSA Conference revealed it is making available an open-source generative artificial intelligence (AI) reasoning model specifically designed to automate cybersecurity analytics and workflows, along with a set of controls ...

AI avalanche: Taming software risk with True Scale Application Security

True Scale Application Security enables organizations to scale their business without compromising on security, speed, accuracy, and compliance. The post AI avalanche: Taming software risk with True Scale Application Security appeared first on ...

RSA defends organizations against AI-powered identity attacks

RSA announced cybersecurity innovations that defend organizations against the next wave of AI powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats. These advancements are especially critical ...

How an Innovation Acceleration Workshop Transformed a Startup’s Trajectory by Uncovering Bigger TAM

Many startups begin with a clear, passionate goal to solve a specific problem. But sometimes, while solving that initial challenge, they discover an even more...Read More The post How an Innovation Acceleration Workshop Transformed a Startup’s ...

Critical Vulnerabilities Found in Planet Technology Industrial Networking Products

Planet Technology industrial switches and network management products are affected by several critical vulnerabilities.  The post Critical Vulnerabilities Found in Planet Technology Industrial Networking Products appeared first on SecurityWeek.

Da bloccati a supportati: aiutare i miei clienti ad atterrare in sicurezza con FireMon

Quando Skybox Security ha chiuso, ho avuto seri dubbi, non solo riguardo al mio lavoro, ma anche su come la situazione avrebbe potuto influire sulla mia credibilità professionale che ho... The post Da bloccati a supportati: aiutare i miei ...

Wallarm Agentic AI Protection blocks attacks against AI agents

Wallarm unveiled Agentic AI Protection, a capability designed to secure AI agents from emerging attack vectors, such as prompt injection, jailbreaks, system prompt retrieval, and agent logic abuse. The new feature extends Wallarm’s API ...

NetRise ZeroLens identifies undisclosed software weaknesses

NetRise announced a new product, NetRise ZeroLens. NetRise’s category redefining platform creates a software asset inventory, which is critical to manage organizational risk. NetRise analyzes compiled code to find risk in software that ...

NetRise Adds Tool to Analyze Application Binaries for Security Flaws

NetRise today at the 2025 RSA Conference unveiled a binary composition analysis (BCA) tool that makes it possible to identify application security weaknesses in applications that have already been deployed. The post NetRise Adds Tool to Analyze ...