Application Security News and Articles


Webinar Today: Inside the First 72 hours of a Cyber Event

Learn how GRC and SOC teams can turn shared threat intelligence into faster action, clearer communication, and stronger organizational resilience. The post Webinar Today: Inside the First 72 hours of a Cyber Event appeared first on SecurityWeek.

Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul

At a recent Tech Field Day Exclusive event, Microsoft unveiled a significant evolution of its security operations strategy—one that attempts to solve a problem plaguing security teams everywhere: the exhausting practice of jumping between ...

React2Shell Attacks Linked to North Korean Hackers

North Korean threat actors are believed to be behind CVE-2025-55182 exploitation delivering EtherRAT. The post React2Shell Attacks Linked to North Korean Hackers appeared first on SecurityWeek.

Identity Security Firm Saviynt Raises $700 Million at $3 Billion Valuation 

The funding round was led by KKR, with participation from Sixth Street Growth, TenEleven, and Carrick Capital Partners. The post Identity Security Firm Saviynt Raises $700 Million at $3 Billion Valuation  appeared first on SecurityWeek.

TransUnion Extends Ability to Detect Fraudulent Usage of Devices

TransUnion today added an ability to create digital fingerprints without relying on cookies that identify, in real time, risky devices and other hidden anomalies to its Device Risk service for combatting fraud. Clint Lowry, vice president of ...

Nudge Security Extends Ability to Secure Data in the AI Era

Nudge Security today extended the scope of its namesake security and governance platform to monitor sensitive data shared via uploads and integrations with an artificial intelligence (AI) service, in addition to now being able to identify ...

Holly Ventures launches $33 million fund focused on early-stage cyber innovation

Holly Ventures announced the launch of its $33 million debut fund, a solo-led cybersecurity vehicle built around a simple idea that for early-stage cyber start-ups, access and value matter more than capital. Founded by John Brennan, formerly a ...

US Posts $10 Million Bounty for Iranian Hackers

The US seeks information on the leader of Emennet Pasargad, Mohammad Bagher Shirinkar, and long-time employee Fatemeh Sedighian Kashi. The post US Posts $10 Million Bounty for Iranian Hackers appeared first on SecurityWeek.

Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Enterprise cybersecurity giant Proofpoint has completed the acquisition of Germany-based Microsoft 365 security solutions provider Hornetsecurity. Financial details were not officially disclosed when news of the transaction came to light, but it ...

Nudge Security expands platform with new AI governance capabilities

Nudge Security announced an expansion of its platform to address the need for organizations to mitigate AI data security risks while supporting workforce AI use. New capabilities include: AI conversation monitoring: Detect sensitive data shared ...

New Black Kite module delivers product-level insight into software supply chain vulnerabilities

Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed ...

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

The botnet attempts to steal credentials from infected TBK DVR devices, in addition to abusing them to launch DDoS attacks. The post New ‘Broadside’ Botnet Poses Risk to Shipping Companies appeared first on SecurityWeek.

watchTowr Active Defense delivers automated protection from exposure to defense

watchTowr announced major capability enhancements, including the launch of Active Defense, a new capability that closes the gap between discovery and protection. Active Defense delivers automated, intelligence-driven protection the moment a ...

Equixly Raises $11 Million for AI-Powered API Penetration Testing

The Italian startup will use the investment to build proprietary AI models, accelerate global expansion, and hire new talent. The post Equixly Raises $11 Million for AI-Powered API Penetration Testing appeared first on SecurityWeek.

Over 300,000 Individuals Impacted by Vitas Hospice Data Breach

Vitas, the largest for-profit hospice chain in the United States, discovered a cybersecurity intrusion in October. The post Over 300,000 Individuals Impacted by Vitas Hospice Data Breach appeared first on SecurityWeek.

AI-driven threats are heading straight for the factory floor

In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She notes that in-house capability, especially for OT ...

AI agents break rules in unexpected ways

AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving every move. This shift is raising questions for security leaders. A new research ...

New image signature can survive cropping, stop deepfakes from hijacking trust

Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines one specific part of this problem. They introduced a way to keep ...

The simple shift that turns threat intel from noise into real insight

In this Help Net Security video, Alankrit Chona, CTO at Simbian, explains how security teams can put threat intelligence to work in a way that supports detection, response, and hunting. Chona walks through why many teams stumble. The problem is ...

Cybersecurity jobs available right now: December 9, 2025

Associate Analyst, Cyber Threat Intelligence Sony | USA | Remote – View job details As an Associate Analyst, Cyber Threat Intelligence, you will collect and analyze open-source threat data to identify signs of cyber threats. You ...