Application Security News and Articles


Cybersecurity Awareness Month Is for Security Leaders, Too

Think you know all there is to know about cybersecurity? Guess again. Shadow AI is challenging security leaders with many of the same issues raised by other “shadow” technologies. Only this time, it’s evolving at breakneck speed. Key ...

Ivanti enhances its solutions portfolio to drive secure, scalable, and streamlined IT operations

Ivanti announced product enhancements across its solution pillars, empowering our customers to accelerate cloud adoption, strengthen security posture and streamline IT operations. Distributed workforce requires seamless and secure access to the ...

Keycard Emerges From Stealth Mode With $38 Million in Funding

The company’s IAM platform identifies AI agents, supports assigning permission to them, and tracks all activity. The post Keycard Emerges From Stealth Mode With $38 Million in Funding appeared first on SecurityWeek.

Attackers turn trusted OAuth apps into cloud backdoors

Attackers are increasingly abusing internal OAuth-based applications to gain persistent access to cloud environments, Proofpoint researchers warn. These apps often remain unnoticed for quite some time and allow attackers to maintain access to ...

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails

Rubrik announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI deployments. AI transformation is now mandatory for most organizations. However, IT leaders are constrained because agentic ...

Retail Cyberattacks Reveal Hidden Weaknesses In Supply Chain Security  

Cyberattacks on UK retailers show rising supply chain risks. Learn how zero-trust, vendor vetting, and continuous monitoring strengthen cyber resilience. The post Retail Cyberattacks Reveal Hidden Weaknesses In Supply Chain Security   appeared ...

Russian APT Switches to New Backdoor After Malware Exposed by Researchers

Star Blizzard started using the NoRobot (BaitSwitch) and MaybeRobot (SimpleFix) malware after public reporting on the LostKeys malware. The post Russian APT Switches to New Backdoor After Malware Exposed by Researchers appeared first on SecurityWeek.

Phishing Scams Weaponize Common Apps to Fool Users

From fake PDFs to AI voice scams, phishing attacks are evolving fast. Learn key tactics and defenses to protect against fraud, identity theft, and account loss. The post Phishing Scams Weaponize Common Apps to Fool Users appeared first on ...

What’s a Good Email Deliverability Rate in 2025?

Learn what a good email deliverability rate is, why it matters, and how to improve it. Explore benchmarks, tools, and strategies to boost your inbox placement. The post What’s a Good Email Deliverability Rate in 2025? appeared first on Security ...

What Makes a Great Field CXO: Lessons from the Front Lines

If you are recruiting for a Field CISO, Field CTO, etc., or are looking to leverage a resource at your company in one of these roles, what are some things you should be aware of? The post What Makes a Great Field CXO: Lessons from the Front Lines ...

Fencing and Pet Company Jewett-Cameron Hit by Ransomware

Jewett-Cameron Company says hackers stole sensitive information and are threatening to release it unless a ransom is paid. The post Fencing and Pet Company Jewett-Cameron Hit by Ransomware appeared first on SecurityWeek.

Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team

Axoflow has launched its Security Data Layer, extending its pipeline offering with multiple storage solutions. The Security Data Layer addresses challenges in log management, SIEM optimization, pipeline reliability, and data accessibility. In ...

How Proxies Help Combat Data Scraping and Fraud

Proxies block malicious bots, prevent data scraping, and detect proxy-aided fraud by filtering traffic and enforcing centralized security policies. The post How Proxies Help Combat Data Scraping and Fraud appeared first on Security Boulevard.

Elastic introduces Agent Builder to simplify AI agent development

Elastic released Agent Builder, a complete set of capabilities powered by Elasticsearch, that makes it easy for developers to build custom AI agents on company data—all within minutes. Agent Builder also provides an out-of-the-box ...

Oracle Releases October 2025 Patches

The Critical Patch Update contains 374 new security patches that resolve many vulnerabilities. The post Oracle Releases October 2025 Patches appeared first on SecurityWeek.

You’ve Lost Access to Your Online Account! What Happens Now?

Learn what happens when you lose access to your online accounts and how to recover them using secure, multi-factor, and strong authentication methods. The post You’ve Lost Access to Your Online Account! What Happens Now? appeared first on ...

Keycard emerges from stealth with identity and access solution for AI agents

Keycard emerged from stealth with its identity and access platform for AI agents that integrates with organizations’ existing user identity solutions. Keycard’s platform identifies AI agents, lets users assign task-based permissions and ...

Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025

Participants exploited 34 previously unknown vulnerabilities to hack printers, NAS devices, and smart home products. The post Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 appeared first on SecurityWeek.

From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security

In today’s ever-evolving digital landscape, businesses must establish robust data security strategies to safeguard sensitive information from modern threats. The reality of escalating cyberattacks, such as the rise in ransomware and data ...

Life, death, and online identity: What happens to your online accounts after death?

The rapid technological advances of recent decades have transformed nearly every aspect of our lives. One major shift is that many of us now maintain extensive digital footprints, spanning countless online accounts, from email and social media to ...