Application Security News and Articles


Elastic introduces Agent Builder to simplify AI agent development

Elastic released Agent Builder, a complete set of capabilities powered by Elasticsearch, that makes it easy for developers to build custom AI agents on company data—all within minutes. Agent Builder also provides an out-of-the-box ...

Oracle Releases October 2025 Patches

The Critical Patch Update contains 374 new security patches that resolve many vulnerabilities. The post Oracle Releases October 2025 Patches appeared first on SecurityWeek.

You’ve Lost Access to Your Online Account! What Happens Now?

Learn what happens when you lose access to your online accounts and how to recover them using secure, multi-factor, and strong authentication methods. The post You’ve Lost Access to Your Online Account! What Happens Now? appeared first on ...

Keycard emerges from stealth with identity and access solution for AI agents

Keycard emerged from stealth with its identity and access platform for AI agents that integrates with organizations’ existing user identity solutions. Keycard’s platform identifies AI agents, lets users assign task-based permissions and ...

Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025

Participants exploited 34 previously unknown vulnerabilities to hack printers, NAS devices, and smart home products. The post Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 appeared first on SecurityWeek.

From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security

In today’s ever-evolving digital landscape, businesses must establish robust data security strategies to safeguard sensitive information from modern threats. The reality of escalating cyberattacks, such as the rise in ransomware and data ...

Life, death, and online identity: What happens to your online accounts after death?

The rapid technological advances of recent decades have transformed nearly every aspect of our lives. One major shift is that many of us now maintain extensive digital footprints, spanning countless online accounts, from email and social media to ...

How to Detect and Mitigate Hit and Run DDoS Attacks

Most DDoS attacks are short in duration. According to Cloudflare, 92% of layer 3/4 attacks and 75% of HTTP DDoS attacks in Q2 2025,ended within 10 minutes.  A subset of these are Hit and Run DDos Attacks, which are gaining popularity among ...

OpenFGA: The open-source engine redefining access control

OpenFGA is an open-source, high-performance, and flexible authorization engine inspired by Google’s Zanzibar system for relationship-based access control. It helps developers model and enforce fine-grained access control in their applications. ...

For blind people, staying safe online means working around the tools designed to help

Blind and low-vision users face the same password challenges as everyone else, but the tools meant to make security easier often end up getting in the way. A study from the CISPA Helmholtz Center for Information Security and DePaul University ...

SMART on FHIR Explained: Use Cases & Implementation Tips

An amazing post The post SMART on FHIR Explained: Use Cases & Implementation Tips appeared first on Security Boulevard.

3 DevOps security pitfalls and how to stay ahead of them

In this Help Net Security video, Dustin Kirkland, SVP of Engineering at Chainguard, explores three of the most pressing DevOps security issues engineers encounter: unpatched code, legacy systems, and the rise of AI and automation. He explains how ...

Companies want the benefits of AI without the cyber blowback

51% of European IT and cybersecurity professionals said they expect AI-driven cyber threats and deepfakes to keep them up at night in 2026, according to ISACA. AI takes centre stage in threat outlook The main reason for this concern is that most ...

Windows Server Update Service (WSUS) Remote Code Execution Vulnerability (CVE-2025-59287) Notice

Overview Recently, NSFOCUS CERT detected that Microsoft released a security update that fixed the Windows Server Update Service (WSUS) remote code execution vulnerability (CVE-2025-59287); Because WSUS’s GetCookie does not perform type ...

Beware of the Risk of Open-Source License Changes

It is not uncommon for open source licenses to change. When licenses change, users often need to re-evaluate compliance risks. Take Redis as an example. Redis is a popular key-value store whose open source license has undergone changes from BSD ...

All You Need to Know About Palm Vein Unlocking Technology

Explore the security and development aspects of palm vein unlocking technology. Learn how it works, its benefits, and how to integrate it into your software. The post All You Need to Know About Palm Vein Unlocking Technology appeared first on ...

Defining What It Means to Be Enterprise Ready

Explore the key features and requirements that define an 'Enterprise Ready' SSO solution. Learn about scalability, security, compliance, and integration for large organizations. The post Defining What It Means to Be Enterprise Ready appeared ...

AWS Outage: Lessons Learned

What can we learn from the recent AWS outage, and how can we apply those lessons to our own infrastructure? What Happened? On October 20, 2025, AWS experienced a major disruption that rippled across the internet (and social media), affecting ...

6 Business Workflows Where Files Create Risk & How to Secure Them

The post 6 Business Workflows Where Files Create Risk & How to Secure Them appeared first on Votiro. The post 6 Business Workflows Where Files Create Risk & How to Secure Them appeared first on Security Boulevard.

MITRE ATT&CK is Deprecating a Tactic: 3 Takeaways from the “Defense Evasion” Break-up

MITRE ATT&CK v18 is deprecating Defense Evasion (TA0005). Learn about the new Stealth and Impair Defenses tactics and what SOC teams need to do next. The post MITRE ATT&CK is Deprecating a Tactic: 3 Takeaways from the “Defense ...