Application Security News and Articles


MCPTotal Unfurls Hosting Service to Secure MCP Servers

MCPTotal today launched a hosting service to secure the Model Context Protocol (MCP) servers that are now starting to be more widely deployed to streamline data access for artificial intelligence (AI) applications and agents. Company CEO Gil ...

Customer Service Firm 5CA Denies Responsibility for Discord Data Breach

After being named by Discord as the third-party responsible for the breach, 5CA said none of its systems were involved. The post Customer Service Firm 5CA Denies Responsibility for Discord Data Breach appeared first on SecurityWeek.

MCPTotal Launches to Power Secure Enterprise MCP Workflows

New York, USA, New York, 15th October 2025, CyberNewsWire The post MCPTotal Launches to Power Secure Enterprise MCP Workflows appeared first on Security Boulevard.

The Human Cost of Cyber Risk: How Exposure Management Can Ease Security Burnout

The true cost of cyber risk is a human one. Siloed tools and disjointed operations aren’t just endangering your business, they’re also taking a real toll on your teams. It’s long past time to take the friction out of cybersecurity with a ...

Introducing Legit AppSec Remediation Campaigns

New capability delivers faster fixes, measurable compliance reporting, and reduced friction across enterprise AppSec programs. The post Introducing Legit AppSec Remediation Campaigns appeared first on Security Boulevard.

Harmonic Security targets AI data risks with Model Context Protocol Gateway

Harmonic Security announced Model Context Protocol (MCP) Gateway, a developer-friendly, locally installed gateway that gives security teams complete visibility and control over their organization’s agentic AI ecosystem. The solution ...

The Third-Party Ripple: Stopping Supply Chain and Vendor Breaches

The New Perimeter: Vendors, Partners, and Everyone in Between The old cybersecurity mantra, “trust but verify,” no longer applies. In today’s hyperconnected world of digital ecosystems, the new rule is clear: “never trust, always ...

Blumira rolls out SOC Auto-Focus to streamline threat investigation

Blumira launched SOC Auto-Focus, an AI-powered security investigation tool, alongside enhancements to its Managed Service Provider (MSP) partner program. SOC Auto-Focus is designed to help IT teams and MSPs work smarter, reduce alert fatigue and ...

Henderson County Schools Finds Confidence in Google Security and Student Safety

Cloud Monitor Provides Visibility and Control Needed to Protect Student Data and Prevent Ransomware Henderson County School District in Lexington, Tennessee, serves about 4,000 students and 400 staff. As Director of Technology, Thomas Garner ...

Kerberoasting Protection

Active Directory environments use Kerberos as the default authentication protocol, which unfortunately makes them particularly vulnerable to “Kerberoasting”, an attack where threat actors leverage the fact that service tickets are encrypted ...

Email Security and Compliance: What MSPs Need to Know in 2026

Earlier this year, we explored the widening gap between email security and compliance. It’s a gap that exists not because the threats are unclear or the risks misunderstood, but because the language of regulation still struggles to catch up ...

The Compliance Automation Revolution 2025

In 2025, compliance is no longer a box-ticking exercise — it’s a strategic business imperative. With new regulations like the EU’s NIS2 Directive, DORA for financial services, CMMC 2.0 for U.S. defense, and the Australian Privacy Act 2024, ...

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Over 20 advisories have been published by industrial giants this Patch Tuesday. The post ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact appeared first on SecurityWeek.

Apple’s Bug Bounty Program

Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website: Today we’re announcing the next major chapter for Apple Security Bounty, featuring the industry’s highest rewards, expanded research categories, and ...

The Real Cost of Security Fatigue and How CTEM Brings It Down

Security fatigue is becoming one of the most overlooked challenges in cybersecurity today. A recent report by Sophos found that 85% of cybersecurity and IT professionals in the Asia-Pacific region... The post The Real Cost of Security Fatigue and ...

Microsoft patches three zero-days actively exploited by attackers

On October 2025 Patch Tuesday, Microsoft released fixes for 175+ vulnerabilities, including three zero-days under active attack: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827. The actively exploited vulnerabilities are an unusual mix ...

Boost AI Risk Management With AI Risk Quantification | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Boost AI Risk Management With AI Risk Quantification | Kovrr appeared first on Security Boulevard.

Roll your own bot detection: server-side detection (part 2)

This is the second part of our series on building a lightweight, vendor-free anti-bot system to protect your login endpoint. In Part 1, we focused on the client side: we designed a fingerprinting script that collects various signals from the ...

Aura enhancements simplify opt-outs and strengthen online privacy

Aura new tools to help consumers reclaim control over their personal information online. The new capabilities automate some of the most time-consuming privacy tasks, including removing personal details from Google search results, opting out of ...

Inside the CISO Mind: How Security Leaders Choose Solutions

Understanding how CISOs navigate noise, trust peers, and make buying decisions The post Inside the CISO Mind: How Security Leaders Choose Solutions appeared first on Security Boulevard.