Application Security News and Articles


Upwind unveils AI-powered Exposure Validation Engine to redefine dynamic CSPM

Upwind has launched its Exposure Validation Engine, a capability that introduces dynamic, real-time validation into the Cloud Security Posture Management (CSPM) layer. This innovation enables security, engineering, and compliance teams to ...

Reflectiz Raises $22 Million for Website Security Solution

The company will expand its product offering, establish global headquarters in Boston, and fuel growth and go-to-market efforts. The post Reflectiz Raises $22 Million for Website Security Solution appeared first on SecurityWeek.

How Can Generative AI Transform the Future of Identity and Access Management 

Generative AI is transforming identity and access management by enabling adaptive authentication, real-time threat detection, and smarter cybersecurity. The post How Can Generative AI Transform the Future of Identity and Access Management  ...

Millions Impacted by Conduent Data Breach

The hackers stole names, addresses, dates of birth, Social Security numbers, and health and insurance information. The post Millions Impacted by Conduent Data Breach appeared first on SecurityWeek.

The ROI of Threat-Led Defense: Reducing Waste in the Security Stack

Security gaps are not the only serious issue CISOs must address. Security overlaps can also cause problems of their own. These overlaps are commonly overlooked, yet they increase operating costs, contribute to alert fatigue, and generate false ...

Why Frost & Sullivan named AppOmni a Growth & Innovation Leader in the 2025 Frost Radar™ for SSPM

Frost & Sullivan recognized AppOmni’s leadership in SaaS security innovation, highlighting our AI, Zero Trust, and app-level depth. The post Why Frost & Sullivan named AppOmni a Growth & Innovation Leader in the 2025 Frost Radar™ ...

AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition

Frost & Sullivan honors AppOmni for excellence in SaaS Security Posture Management, recognizing its innovation, scale, and customer impact. The post AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition ...

AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security Posture Management, Earns Tech Innovation Leadership Recognition

AppOmni is named Growth & Innovation Leader in 2025 Frost Radar™ for SSPM and awarded with Tech Innovation Recognition by Frost & Sullivan. The post AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security ...

Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)

Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers. An out-of-band update Last week’s release of an emergency fix for CVE-2025-59287, a ...

Major US Telecom Backbone Firm Hacked by Nation-State Actors

Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.  The post Major US Telecom Backbone Firm Hacked by Nation-State Actors appeared first on SecurityWeek.

Aembit Introduces Identity and Access Management for Agentic AI

Silver Spring, USA/ Maryland, 30th October 2025, CyberNewsWire The post Aembit Introduces Identity and Access Management for Agentic AI appeared first on Security Boulevard.

Security Without Friction: How Repoflow Created a DevSecOps Package Manager with Grype

RepoFlow was created with a clear goal: to provide a simple package management alternative that just works without the need for teams to manage or maintain it. Many existing solutions required constant setup, tuning, and oversight. RepoFlow ...

Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

The Canadian Centre for Cyber Security has warned CISOs that hacktivists are increasingly targeting internet-exposed ICS. The post Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm appeared first on SecurityWeek.

The Correlation Between MSP Growth and Proper Client Prospecting

What deems a prospect good or bad for your business? The post The Correlation Between MSP Growth and Proper Client Prospecting appeared first on Security Boulevard.

136 NPM Packages Delivering Infostealers Downloaded 100,000 Times

The packages deployed malicious code harvesting system information, credentials, tokens, API keys, and other sensitive information. The post 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times appeared first on SecurityWeek.

AI Application Security with MCP Server | Contrast MCP Server | Contrast Security

When we introduced the Contrast Model-Context Protocol (MCP) Server a few months ago (read Supercharge your vulnerability remediation with Contrast MCP), the promise was clear: to give AI agents access to the rich security context within the ...

Former US Defense Contractor Executive Admits to Selling Exploits to Russia

Peter Williams stole trade secrets from his US employer and sold them to a Russian cybersecurity tools broker. The post Former US Defense Contractor Executive Admits to Selling Exploits to Russia appeared first on SecurityWeek.

Confluent Private Cloud enables real-time data streaming and governance for regulated industries

Confluent has released Confluent Private Cloud, the simplest way to deploy, manage, and govern streaming data on private infrastructure. The solution addresses the challenge of scaling Apache Kafka on-premises in highly regulated industries by ...

Akeyless introduces AI Agent Identity Security for safer AI operations

Akeylesshas released a new AI Agent Identity Security solution designed to secure the rise of autonomous AI systems. AI Agent identity crisis More than 95% of organizations are planning to adopt and use AI agents in the next 12 months. The surge ...

New OpenText capabilities enhance enterprise defense with AI across identity, data, and apps

OpenText announced new cybersecurity capabilities designed to help enterprises embed AI into everyday security operations and enforce governance and compliance at scale. OpenText Cybersecurity unifies defenses across identity, data, applications, ...