Application Security News and Articles


Trellix unveils Helix integration with Hyperautomation to streamline SOC operations

Trellix announced Trellix Helix is now integrated with Trellix Hyperautomation, a no-code, drag-and-drop workflow builder that automates security processes. Trellix Helix provides customers with AI-powered context across all threat vectors and ...

What is a Passkey for Mobile Devices?

Explore passkeys for mobile devices: what they are, how they work, their security advantages, and implementation strategies for developers. The post What is a Passkey for Mobile Devices? appeared first on Security Boulevard.

Survey Surfaces Greater Appreciation for AI Risks

A new Vanta survey of 3,500 IT and business leaders reveals that 72% believe cybersecurity risks have never been higher due to AI. While 79% are using or planning to use AI agents to defend against threats, many admit their understanding lags ...

StrongestLayer Adds AI Reasoning Engine to Validate Emails

StrongestLayer has launched AI Advisor, an advanced email protection tool powered by large language models (LLMs) that evaluates message provenance in real time to detect phishing attacks. By triangulating sender legitimacy and assigning dynamic ...

New Zscaler ZDX features strengthen zero trust and streamline performance monitoring

Zscaler unveiled new Zscaler Digital Experience (ZDX) innovations that help enterprises monitor and fix performance issues faster, achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues ...

Acronis Cyber Protect Local brings unified cyber protection to cloud-restricted environments

Acronis announced the launch of Acronis Cyber Protect Local, a solution that delivers natively integrated cyber resilience for on-premises, sovereign private cloud, and air-gapped IT and OT environments. Designed for organizations where cloud ...

FCC Tightens the Squeeze on Banned Chinese Telecom Companies

The FCC has taken another step to keep Chinese telecom gear from being imported into the United States, voting 3-0 to block new approvals for products from those nine Chinese companies on its "Covered List" and considered potential national ...

How Quantum Computing Will Transform Data Security, AI, and Cloud Systems

Quantum computing is set to redefine data security, AI, and cloud infrastructure. This in-depth research explores how post-quantum cryptography, quantum AI acceleration, and hybrid quantum-cloud systems will reshape technology by 2035—and what ...

AI Security Firm Polygraf Raises $9.5 Million in Seed Funding

Polygraf AI has developed proprietary small language model (SLM) technology designed to help organizations mitigate AI risks. The post AI Security Firm Polygraf Raises $9.5 Million in Seed Funding appeared first on SecurityWeek.

SOA Expire Value Out of Recommended Range: What It Means and How to Fix It

Seeing the “SOA expire value out of recommended range” warning? Learn what it means, the recommended range for SOA expire values, and how to fix this DNS configuration issue easily. The post SOA Expire Value Out of Recommended Range: What It ...

Python Foundation rejects US government grant earmarked for security improvements

The Python Software Foundation (PSF) has rejected a $1.5 million government grant due to restrictive conditions that would force the foundation to betray its mission and its community, the programming non-profit announced on Monday. “In ...

CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution

The company has built a plug-and-play photonic layer transmission system that encrypts data in transit to prevent interception. The post CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution appeared first on SecurityWeek.

Signal’s Post-Quantum Cryptographic Implementation

Signal has just rolled out its quantum-safe cryptographic implementation. Ars Technica has a really good article with details: Ultimately, the architects settled on a creative solution. Rather than bolt KEM onto the existing double ratchet, they ...

API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re ...

XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Exploits have been available publicly for over half a year, but the bug was previously targeted only for reconnaissance. The post XWiki Vulnerability Exploited in Cryptocurrency Mining Operation appeared first on SecurityWeek.

Ad and PR Giant Dentsu Says Hackers Stole Merkle Data

Japan’s Dentsu has disclosed a Merkle data breach impacting clients, suppliers, and employees. The post Ad and PR Giant Dentsu Says Hackers Stole Merkle Data appeared first on SecurityWeek.

When 183 Million Passwords Leak: How One Breach Fuels a Global Threat Chain

When 183 million email addresses and passwords are made public online, it is more than a leak. It is an open invitation for attackers to exploit weak links across the digital ecosystem. The recent discovery of a massive database containing stolen ...

Security Training Just Became Your Biggest Security Risk 

Traditional security awareness training is now undermining enterprise security and productivity. As AI-generated phishing eliminates familiar “red flags,” organizations must move beyond vigilance culture toward AI-assisted trust ...

Chrome to Turn HTTPS on by Default for Public Sites

Starting October 2026, the browser will ask users if they want to access public websites that do not use secure connections. The post Chrome to Turn HTTPS on by Default for Public Sites appeared first on SecurityWeek.

Converged OT/IT Cybersecurity: Breaking Barriers for Unified Protection

As industrial operations and digital systems continue to merge, organizations are entering a new era of cybersecurity challenges. The boundaries between Operational Technology (OT) and Information Technology (IT) have blurred, and with this ...