Application Security News and Articles


Azure B2C Alternative for Startups

Tired of Azure B2C complexity? Read how real founders switched to faster, simpler identity APIs like MojoAuth and finally slept better The post Azure B2C Alternative for Startups appeared first on Security Boulevard.

Samba WINS Command Injection Vulnerability (CVE-2025-10230) Notice

Overview Recently, NSFOCUS CERT detected that Samba released a security update to fix the Samba WINS command injection vulnerability (CVE-2025-10230); Since WINS when Samba is used as an AD domain controller does not strictly verify the wins hook ...

AISLE emerges from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities

AISLE emerged from stealth, delivering the AI-native cyber reasoning system (CRS) that autonomously identifies, triages and remediates with verification both known and zero-day application vulnerabilities, which still account for the majority of ...

Levo.ai platform unifies AI security and compliance from development to runtime

Levo.ai has released its Unified AI Security Platform, designed to secure AI applications from development to runtime. The platform unifies five modules under a single control plane, enabling enterprises to deploy AI while meeting compliance and ...

How Ransomware’s Data Theft Evolution is Rewriting Cyber Insurance Risk Models 

Ransomware has evolved from encryption to data theft. Learn how AI-driven attacks and breach data are reshaping cyber insurance risk models and pricing. The post How Ransomware’s Data Theft Evolution is Rewriting Cyber Insurance Risk Models  ...

A new approach to blockchain spam: Local reputation over global rules

Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper from Delft University of Technology introduces a decentralized solution called STARVESPAM that could help nodes in ...

ExaGrid enhances Tiered Backup Storage with new MSP-focused features in Version 7.4.0

ExaGrid announced that its Version 7.4.0 release includes new features optimized for Managed Service Providers (MSPs) who use ExaGrid Tiered Backup Storage to protect their customers’ data. Many organizations use MSPs to outsource either a ...

Inside healthcare’s quiet cybersecurity breakdown

Hospitals, clinics, and care networks continue to treat cybersecurity as a back-office issue, according to the 2025 Healthcare IT Landscape Report from Omega Systems. Security takes a back seat Healthcare IT leaders are juggling competing ...

SAP zero-day wake-up call: Why ERP systems need a unified defense

In this Help Net Security video, Paul Laudanski, Director of Research at Onapsis, discusses key lessons from the SAP zero-day vulnerability. He explains why business-critical systems like ERP and CRM remain top targets for attackers, since they ...

Everyone’s adopting AI, few are managing the risk

AI is spreading across enterprise risk functions, but confidence in those systems remains uneven, according to AuditBoard. More than half of organizations report implementing AI-specific tools, and many are training teams in machine learning ...

New infosec products of the week: October 17, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Aura, Bitsight, Blumira, Cayosoft, Corelight, Netcraft, and Picus Security. Picus Security uses AI to turn threat intelligence into attack simulations ...

F5 Security Incident Advisory

Executive SummaryOn October 15, 2025, F5 Networks publicly disclosed a serious security breach involving a nation-state threat actor. The intruders maintained long-term, persistent access to F5’s internal systems—specifically the BIG-IP ...

How Votiro Turns Threat Prevention Into Intelligence

The post How Votiro Turns Threat Prevention Into Intelligence appeared first on Votiro. The post How Votiro Turns Threat Prevention Into Intelligence appeared first on Security Boulevard.

AI-Powered Compliance Audits: Boosting Cybersecurity & Efficiency

Key Takeaways For many organizations, compliance audits are still synonymous with spreadsheets, evidence gathering, and last-minute scrambles. Teams spend weeks tracking down screenshots, reports, and ticket records to prove that their controls ...

Building Strong Container Security for Modern Applications

Discover how to protect containerized applications. The post Building Strong Container Security for Modern Applications appeared first on Security Boulevard.

SIEM, Startups, and the Myth (Reality?) of IT Inertia: A Reformed Analyst Reflects on SIEM MQ 2025

Vaguely magical and quadranty thing (Gemini) It’s not every day you get to reflect on a journey that started as an odd “googley” startup and culminates in a shiny Leaders placement on a Gartner Magic Quadrant for SIEM 2025 (MQ). When I ...

Choosing the Best NHIs Options for Your Needs

What Are Non-Human Identities (NHIs) and Why Are They Crucial for Modern Cybersecurity? Have you ever wondered how machine identities are managed in cybersecurity, especially in cloud environments? Non-Human Identities (NHIs) are an integral ...

Foster Innovation with Strong NHI Security Measures

Are Your Machine Identities Truly Secure? The notion of securing Non-Human Identities (NHIs) often takes center stage. Where machine identities become more prevalent across industries, managing these identities and their related secrets has never ...

Satisfying Regulatory Requirements with PAM

How Do Non-Human Identities Impact Your Organization’s Cybersecurity Strategy? If you’ve ever pondered the complexities of managing machine identities, you’re not alone. Where the digital infrastructure of businesses becomes increasingly ...

Sky-High Hack: How $600 Unlocked Global Secrets Streaming from Space

Right now, satellites are broadcasting your most private data in plaintext. A groundbreaking academic study just exposed a catastrophic security failure: using roughly $600 of consumer-grade equipment—the kind satellite TV hobbyists ...