Application Security News and Articles


SimSpace Raises $39 Million for Cyber Range Platform

SimSpace provides realistic cyber ranges where organizations can test attack preparedness and validate defenses. The post SimSpace Raises $39 Million for Cyber Range Platform appeared first on SecurityWeek.

Nozomi Networks enhances OT security with latest Arc release

Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of Nozomi Arc, users gain automated threat prevention capabilities for OT endpoints. First ...

Palo Alto Networks Extends Scope and Reach of AI Capabilities

Palo Alto Networks unveils Prisma AIRS 2.0 and Cortex AgentiX to secure AI applications and automate cybersecurity workflows. With new AI-driven protection, no-code agent building, and integrated threat detection, the company aims to simplify and ...

TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks

A new class of Mirai-based DDoS botnets have been launching massive attacks, but their inability to spoof traffic enables device remediation. The post TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks appeared first on ...

Italian-made spyware Dante linked to Chrome zero-day exploitation campaign

CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was used by unknown attackers to deliver LeetAgent, suspected commercial spyware. An analysis of the ...

AI Visibility: The Key to Responsible Governance | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post AI Visibility: The Key to Responsible Governance | Kovrr appeared first on Security Boulevard.

Sublime Security Raises $150 Million for Email Security Platform

Sublime Security’s Series C funding round brings the total raised by the company to more than $240 million. The post Sublime Security Raises $150 Million for Email Security Platform appeared first on SecurityWeek.

Preventing training data leakage in AI systems

Training data leakage can significantly undermine the validity of AI models. It can also pose a critical privacy risk. Read on to understand two divergent definitions of a key term in AI model training. The post Preventing training data leakage ...

IRISSCON 2025 to address the human impact on cybersecurity

Recent high-profile cybersecurity breaches affecting global brands share a common link: the human factor. Expert speakers will cover this subject in depth at IRISSCON 2025, which takes place at Dublin’s Aviva Stadium on Wednesday November ...

DAST vs AI Code: Why Dynamic Application Security Testing Can’t Keep Pace

DAST vs AI Code: TL;DR Traditional DAST requires 8+ hours for comprehensive scanning while AI-generated code deploys 10 times daily. This speed mismatch creates a fundamental security gap: most organizations run DAST weekly, leaving 70+ ...

Sublime Security secures $150 million to accelerate AI-driven, automated email protection

Sublime Security has raised $150 million in Series C funding led by Georgian to accelerate its agentic AI capabilities and bring new levels of proactive, automated defense to email security. Other participants include new investors Avenir and ...

New Corero SmartWall ONE capability blocks encrypted DDoS threats without latency

Corero Network Security announced a new SmartWall ONE capability that stops encrypted application-layer attacks in real time without added latency or infrastructure. The enhancement addresses one of the most pressing blind spots in modern ...

Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack

Data allegedly stolen from the companies has been made available for download on the Cl0p ransomware leak website. The post Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack appeared first on SecurityWeek.

Beyond The CVE: Deep Container Analysis with Anchore

As an Associate Professor of Cybersecurity, I spend a lot of time thinking about risk, and increasingly, that risk lives within the software supply chain. The current industry focus on CVEs is a necessary, but ultimately insufficient, approach to ...

Security for AI: A Practical Guide to Enforcing Your AI Acceptable Use Policy

An AI acceptable use policy can help your organization mitigate the risk of employees accidentally exposing sensitive data to public AI tools. Benchmark your organization’s policy against our best practices and discover how prompt-level ...

A Major Leap Forward: FireTail Unveils New UI and Expansive AI Model Support to Secure & Enable Enterprise AI Adoption – FireTail Blog

Oct 28, 2025 - Alan Fagan - In the world of artificial intelligence, speed is the new security challenge. AI adoption is accelerating at an unprecedented rate, bringing transformative capabilities, and new risks, to the enterprise. As ...

Cybercriminals Trade 183 Million Stolen Credentials on Telegram, Dark Forums

The email addresses were pulled from various sources and 16.4 million of them were not present in previous data breaches. The post Cybercriminals Trade 183 Million Stolen Credentials on Telegram, Dark Forums appeared first on SecurityWeek.

Hackers Target Swedish Power Grid Operator

The hackers stole information from a file transfer solution and the country’s power supply was not affected. The post Hackers Target Swedish Power Grid Operator appeared first on SecurityWeek.

Collaborative Writing Tools & How to Secure Them for Teams

Learn how to secure collaborative writing tools for teams, manage permissions, and use AI detection to protect academic integrity in shared environments. The post Collaborative Writing Tools & How to Secure Them for Teams appeared first on ...

Balancing Usability & Security in Student Apps: Lessons from Passwordless Design

Discover how passwordless design helps student apps stay secure while remaining easy to use. Learn how to balance usability and security effectively. The post Balancing Usability & Security in Student Apps: Lessons from Passwordless Design ...