Application Security News and Articles
Automated pentesting is now one of the most hyped topics in cybersecurity, with AI systems promising to replace human hackers. But how much is real, and how much is marketing hype?
This webinar provides a practical guide to automating offensive ...
MojoAuth experienced a temporary service disruption on October 21, 2025, caused by an AWS regional outage. This post-incident report outlines the timeline, root cause, mitigation steps, and permanent improvements we’ve implemented to enhance ...
Discover how the new IETF draft extends SCIM to manage AI agents and agentic applications. Learn how SSOJet is preparing for this evolution — enabling secure lifecycle management, provisioning, and auditing for autonomous digital workers in ...
Hyundai AutoEver America was hacked in February and the attackers managed to steal SSNs and other personal data.
The post Automotive IT Firm Hyundai AutoEver Discloses Data Breach appeared first on SecurityWeek.
The flaws allow attackers to execute arbitrary code remotely and elevate their privileges to root on an affected system.
The post Cisco Patches Critical Vulnerabilities in Contact Center Appliance appeared first on SecurityWeek.
Google and Yahoo announce new email security requirements to take email fraud prevention to the next level in 2024, for a less spammy and secure inbox.
The post Google and Yahoo Updated Email Authentication Requirements for 2025 appeared first ...
State-aligned hacking groups have spent the past six months ramping up espionage, sabotage, and cybercrime campaigns across multiple regions, according to ESET’s APT Activity Report covering April through September 2025. The research highlights ...
The threat actor stole the firewall configuration files of all SonicWall customers who used the cloud backup service.
The post State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack appeared first on SecurityWeek.
1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to deliver real-time data, identity, usage, ...
Static security tuning creates dangerous blind spots that attackers exploit. Learn how dynamic context awareness transforms security operations by reducing false positives, preserving signal fidelity, and eliminating the hidden risks of ...
Learn how to implement Security Service Edge (SSE) effectively to enhance cybersecurity, reduce human risk, and maintain user productivity. Discover how a zero-trust approach, SSL inspection, and outcomes-based deployment can strengthen security ...
Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI Triage, which ...
Learn how to configure SPF, DKIM, and DMARC for Zoho Mail to secure your domain, prevent spoofing, and boost email deliverability step-by-step.
The post A Step-by-Step Guide to Setting Up SPF, DKIM, and DMARC for Zoho Mail appeared first on ...
Learn how to set up SPF, DKIM, and DMARC for MailerLite to secure your domain, prevent spoofing, and boost email deliverability step-by-step.
The post A Step-by-Step Guide to Setting Up SPF, DKIM, and DMARC for MailerLite appeared first on ...
MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat ...
Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control over secure mobile access. The new ...
Binarly released the Binarly Transparency Platform 3.5 with Java ecosystem support, enterprise-grade YARA integration, and operational upgrades. With this update, Binarly’s cryptographic algorithm identification engine now supports Java ...
When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick it into leaking data or generating harmful content? That question is driving a wave ...
Bitdefender announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organizations cut through alert overload and complexity by unifying security telemetry from multiple ...
As LLMs, agents and Model Context Protocols (MCPs) reshape software architecture, API sprawl is creating major security blind spots. The 2025 GenAI Application Security Report reveals why continuous API discovery, testing and governance are now ...