Application Security News and Articles


SOA Expire Value Out of Recommended Range: What It Means and How to Fix It

Seeing the “SOA expire value out of recommended range” warning? Learn what it means, the recommended range for SOA expire values, and how to fix this DNS configuration issue easily. The post SOA Expire Value Out of Recommended Range: What It ...

Python Foundation rejects US government grant earmarked for security improvements

The Python Software Foundation (PSF) has rejected a $1.5 million government grant due to restrictive conditions that would force the foundation to betray its mission and its community, the programming non-profit announced on Monday. “In ...

CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution

The company has built a plug-and-play photonic layer transmission system that encrypts data in transit to prevent interception. The post CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution appeared first on SecurityWeek.

Signal’s Post-Quantum Cryptographic Implementation

Signal has just rolled out its quantum-safe cryptographic implementation. Ars Technica has a really good article with details: Ultimately, the architects settled on a creative solution. Rather than bolt KEM onto the existing double ratchet, they ...

API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re ...

XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Exploits have been available publicly for over half a year, but the bug was previously targeted only for reconnaissance. The post XWiki Vulnerability Exploited in Cryptocurrency Mining Operation appeared first on SecurityWeek.

Ad and PR Giant Dentsu Says Hackers Stole Merkle Data

Japan’s Dentsu has disclosed a Merkle data breach impacting clients, suppliers, and employees. The post Ad and PR Giant Dentsu Says Hackers Stole Merkle Data appeared first on SecurityWeek.

When 183 Million Passwords Leak: How One Breach Fuels a Global Threat Chain

When 183 million email addresses and passwords are made public online, it is more than a leak. It is an open invitation for attackers to exploit weak links across the digital ecosystem. The recent discovery of a massive database containing stolen ...

Security Training Just Became Your Biggest Security Risk 

Traditional security awareness training is now undermining enterprise security and productivity. As AI-generated phishing eliminates familiar “red flags,” organizations must move beyond vigilance culture toward AI-assisted trust ...

Chrome to Turn HTTPS on by Default for Public Sites

Starting October 2026, the browser will ask users if they want to access public websites that do not use secure connections. The post Chrome to Turn HTTPS on by Default for Public Sites appeared first on SecurityWeek.

Converged OT/IT Cybersecurity: Breaking Barriers for Unified Protection

As industrial operations and digital systems continue to merge, organizations are entering a new era of cybersecurity challenges. The boundaries between Operational Technology (OT) and Information Technology (IT) have blurred, and with this ...

Socure enhances RiskOS AI Suite with AI agents to transform identity, compliance, and risk decisioning

Socure unveiled an expanded RiskOS AI Suite of solutions featuring six breakthrough AI agents and assistants that substantially elevate the speed, intelligence, and precision of enterprise identity, compliance, and authentication operations. The ...

Arctera InfoScale gains AI capabilities to identify and contain ransomware attacks

Arctera announced new AI-powered features in Arctera InfoScale that enable organizations to identify and respond to ransomware indicators in real time. By learning behavioral patterns across applications, storage and infrastructure, Arctera ...

Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle

Palo Alto Networks announced Prisma AIRS 2.0, a major platform upgrade that completes the native integration of recently acquired Protect AI to deliver a comprehensive AI security platform. This release directly confronts a critical enterprise ...

CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Two DELMIA Apriso flaws can be chained together to gain privileged access to the application and execute arbitrary code remotely. The post CISA Warns of Exploited DELMIA Factory Software Vulnerabilities appeared first on SecurityWeek.

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping

Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for non-compliant personal data sharing. Leveraging AI agents to reason and take action, Privado.ai’s ...

Trulioo expands identity platform to strengthen fraud prevention and streamline compliance

Trulioo announced product enhancements designed to build trust at every stage of the digital journey, from initial verification and payment processing to ongoing compliance monitoring and risk assessment. The latest innovations, delivered across ...

New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Intel and AMD have published advisories after academics disclosed details of the new TEE.fail attack method. The post New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs  appeared first on SecurityWeek.

AI agents can leak company data through simple web searches

When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull sensitive data out of an ...

Apache Tomcat Path Traversal Vulnerability (CVE-2025-55752) Notice

Overview Recently, NSFOCUS CERT detected that Apache issued a security bulletin to fix the Apache Tomcat path traversal vulnerability (CVE-2025-55752); This vulnerability is a flaw introduced when fixing CVE-2016-5388. Since the rewritten URL is ...