Application Security News and Articles


LevelBlue acquires Cybereason to expand global MDR, XDR, and threat response leadership

LevelBlue has signed a definitive agreement to acquire Cybereason, a cybersecurity firm known for its Extended Detection and Response (XDR) platform, threat intelligence team, and digital forensics and incident response (DFIR) capabilities. For ...

Cybereason Acquired by MSSP Giant LevelBlue

This is LevelBlue’s third acquisition this year, after Trustwave and Aon’s Cybersecurity & IP Litigation Consulting groups. The post Cybereason Acquired by MSSP Giant LevelBlue appeared first on SecurityWeek.

6 Signs Your Point of Sale Systems are Under Attack

Point-of-sale (POS) data breaches continue to be one of the most damaging and costly cybersecurity incidents in the retail, restaurant, and hospitality industries. According to Verizon's 2025 Data Breach Investigations Report (DBIR), POS systems ...

Regula simplifies identity verification with its new all-in-one IDV Platform

Regula has launched its Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale according to an organization’s ...

Pharmacy Cybersecurity Without Compromise: Reducing Costs and Protecting Patient Data at Scale

The Days of Fragmented Cybersecurity Are Over Pharmaceutical and healthcare organizations face unprecedented cybersecurity challenges. With cloud adoption, IoT expansion, digital pharmacies, and rising ransomware attacks, the old approach of ...

Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report

Tel Aviv, Israel, 14th October 2025, CyberNewsWire The post Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report appeared first on Security Boulevard.

SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM

SAP has rolled out additional protections for insecure deserialization bugs resolved in NetWeaver AS Java recently. The post SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM appeared first on SecurityWeek.

Picus Security uses AI to turn threat intelligence into attack simulations

Picus Security launched new AI-powered breach and attack simulation (BAS) capabilities within the Picus Security Validation Platform. This introduces a new level of speed and intelligence, enabling security teams to create and simulate complex ...

NetApp strengthens its enterprise data platform with new AI-focused innovations

NetApp unveiled new products, strengthening its enterprise-grade data platform for AI innovation. The new NetApp AFX decouples performance and capacity with a disaggregated NetApp ONTAP that runs on the new NetApp AFX 1K storage system. NetApp AI ...

SSH Proxy, Using a Jumphost

Those who know me know about my love of the Raspberry Pi. I’ve got tons of them stashed around various places to provide a variety of services. One thing I use them for is to allow me access into remote networks via Twingate for troubleshooting ...

Unsupported OpenJDK in Financial Systems: Hidden Risks

Summary Financial institutions using Java can remain compliant with the EU’s DORA security framework with a secure, supported and stable Java platform. For this reason, all the world’s top 10 trading companies and six of the top 10 U.S. ...

Fraud Prevention Firm Resistant AI Raises $25 Million

Resistant AI will use the funding to expand its fraud detection and transaction monitoring offerings to new markets. The post Fraud Prevention Firm Resistant AI Raises $25 Million appeared first on SecurityWeek.

Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack

Hackers have posted over 1 Tb of information allegedly stolen from Harvard on the Cl0p data leak website. The post Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack appeared first on SecurityWeek.

Beyond the Black Box: Building Trust and Governance in the Age of AI

Balancing innovation with ethical governance is crucial for ensuring fairness, accountability, and public trust in the age of intelligent machines. The post Beyond the Black Box: Building Trust and Governance in the Age of AI appeared first on ...

Pixnapping Attack Steals Data From Google, Samsung Android Phones

Google has released a partial patch for the Pixnapping attack and is working on an additional fix. The post Pixnapping Attack Steals Data From Google, Samsung Android Phones appeared first on SecurityWeek.

Visa’s Trusted Agent Protocol sets new standard for secure agentic transactions

Visa unveiled the Trusted Agent Protocol, establishing a foundational framework for agentic commerce that enables secure communication between AI agents and merchants during every step of a transaction. The Trusted Agent Protocol aims to address ...

CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future?

SecurityWeek talks to Microsoft Deputy CISOs Ann Johnson and Mark Russinovich. The post CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? appeared first on SecurityWeek.

RMPocalypse: New Attack Breaks AMD Confidential Computing

A vulnerability in RMP initialization allows the AMD processor’s x86 cores to maliciously control parts of the initial RMP state. The post RMPocalypse: New Attack Breaks AMD Confidential Computing appeared first on SecurityWeek.

SAST vs DAST in OutSystems

A Practical Guide for DevelopersContinue reading on ITNEXT »

Windows 10 Still on Over 40% of Devices as It Reaches End of Support

Users can continue receiving important security updates for Windows 10 by enrolling in the ESU program. The post Windows 10 Still on Over 40% of Devices as It Reaches End of Support appeared first on SecurityWeek.