Application Security News and Articles


StrongestLayer launches AI Advisor to verify unknown senders in real time

StrongestLayer has launched AI Advisor, an inbox-native security assistant designed to verify first-time senders and unknown contacts in real time. The Outlook and Gmail plugin provides instant, AI-powered analysis for any email that raises ...

How neighbors could spy on smart homes

Even with strong wireless encryption, privacy in connected homes may be thinner than expected. A new study from Leipzig University shows that someone in an adjacent apartment could learn personal details about a household without breaking any ...

How the City of Toronto embeds security across governance and operations

In this Help Net Security interview, Andree Noel, Deputy CISO at City of Toronto, discusses how the municipality strengthens its cyber defense by embedding security into strategic objectives and digital governance. She outlines the City’s ...

Your photo could be all AI needs to clone your voice

A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this possibility, testing how well deepfake detectors perform against FOICE ...

Hottest cybersecurity open-source tools of the month: October 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Chekov: Open-source static code analysis tool Checkov is an open-source tool designed ...

Email breaches are the silent killers of business growth

78% of organizations were hit by an email breach in the past 12 months, according to the Email Security Breach Report 2025 by Barracuda. Phishing, impersonation, and account takeover continue to drive incidents that often lead to ransomware and ...

SUSE Linux Enterprise Server 16 puts AI in the operating system

SUSE has released SUSE Linux Enterprise Server (SLES) 16, calling it AI-ready and built for long-term use. The release marks the first major update in the Enterprise Server line in more than five years and signals a new direction for how Linux ...

Impenetrable Security for Non-Human Identities

The Strategic Importance of Non-Human Identities in Cybersecurity Have you ever considered how critical Non-Human Identities (NHIs) are to the security architecture of numerous sectors? With the increasing reliance on automated systems and ...

Free Your Organization from Identity Threats

Are Machine Identities the Key to Freeing Your Organization from Threats? When considering ways to protect organizations from emerging cybersecurity threats, one often-overlooked element is the management of Non-Human Identities (NHIs). With more ...

Planning 2026 Managed Services Budget: Approval Strategies That Work

As 2025 draws to a close, IT and business leaders face a shrinking window to proactively secure managed services budget approval for 2026. In a year shaped by volatility, rising prices, and evolving security threats, each budget dollar must show ...

MY TAKE: What a cystoscopy taught me about the changing face of patient care — and trusting AI

The other day, I found myself flat on my back in a urologist’s exam room, eyes fixed on the ceiling tiles as a cystoscope made its slow, deliberate circuit. Related: Click-baiters are having an AI  field day Dr. Mitchell narrated … (more…) ...

XDR Solutions

Traditional defenses like firewalls, standalone SIEMs, and endpoint-only protection are no longer enough. Security teams face a perfect storm—rising attack volumes, alert overload, limited staff, and complex hybrid environments spanning ...

NDSS 2025 – Securing BGP ASAP: ASPA And Other Post-ROV Defenses Session 1B: Internet Security

Authors, Creators & Presenters: Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of Connecticut), Arvind Kasiliya (University of Connecticut), Bing Wang (University of ...

Survey Surfaces Rise in Email Security Incidents Tied to Ransomware

A survey of 2,000 senior security decision-makers published this week finds more than three quarters (78%) work for organizations that experienced an email security breach in the past 12 months. Conducted by the market research firm Vanson Bourne ...

How HPE’s New Security Playbook Is Actually Stopping Threats

For the past few years, the term “AI in cybersecurity” has been mostly marketing fluff. We’ve all sat through vendor presentations promising a magical AI black box that solves everything, only to find it’s just a fancier ...

Randall Munroe’s XKCD ‘Skateboard’”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Skateboard’” appeared first on Security Boulevard.

ZEST Security launches free AI-based remediation risk assessment for security teams

ZEST Security announced its free remediation risk assessment. The industry is overflowing with tools to identify vulnerabilities, but these tools all fail to provide context that has real operational impact. ZEST is bridging that gap by offering ...

OpenAI’s gpt-oss-safeguard enables developers to build safer AI

OpenAI is releasing a research preview of gpt-oss-safeguard, a set of open-weight reasoning models for safety classification. The models come in two sizes: gpt-oss-safeguard-120b and gpt-oss-safeguard-20b. Both are fine-tuned versions of the ...

Cybersecurity Awareness Month 2025: Customer-Centric Innovation from ColorTokens

Bringing frictionless implementation [Progressive Segmentation™ and EDR integration] and rapid value realization to an award-winning and peer-recognized technology platform demystifies, simplifies, and makes it extremely easy for our customers ...

Transforming Software Compliance with AI SBOM Management

If your software serves federal missions, you face twin pressures to move faster and prove exactly what's in your software. The post Transforming Software Compliance with AI SBOM Management appeared first on Security Boulevard.