Application Security News and Articles


Socure enhances RiskOS AI Suite with AI agents to transform identity, compliance, and risk decisioning

Socure unveiled an expanded RiskOS AI Suite of solutions featuring six breakthrough AI agents and assistants that substantially elevate the speed, intelligence, and precision of enterprise identity, compliance, and authentication operations. The ...

Arctera InfoScale gains AI capabilities to identify and contain ransomware attacks

Arctera announced new AI-powered features in Arctera InfoScale that enable organizations to identify and respond to ransomware indicators in real time. By learning behavioral patterns across applications, storage and infrastructure, Arctera ...

Palo Alto Networks launches Prisma AIRS 2.0 to deliver end-to-end security across the AI lifecycle

Palo Alto Networks announced Prisma AIRS 2.0, a major platform upgrade that completes the native integration of recently acquired Protect AI to deliver a comprehensive AI security platform. This release directly confronts a critical enterprise ...

CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Two DELMIA Apriso flaws can be chained together to gain privileged access to the application and execute arbitrary code remotely. The post CISA Warns of Exploited DELMIA Factory Software Vulnerabilities appeared first on SecurityWeek.

Privado.ai introduces AI agents to automate privacy assessments and real-time data mapping

Privado.ai released several new capabilities to automate privacy assessments and data maps for privacy teams amid growing privacy enforcement for non-compliant personal data sharing. Leveraging AI agents to reason and take action, Privado.ai’s ...

Trulioo expands identity platform to strengthen fraud prevention and streamline compliance

Trulioo announced product enhancements designed to build trust at every stage of the digital journey, from initial verification and payment processing to ongoing compliance monitoring and risk assessment. The latest innovations, delivered across ...

New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Intel and AMD have published advisories after academics disclosed details of the new TEE.fail attack method. The post New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs  appeared first on SecurityWeek.

AI agents can leak company data through simple web searches

When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how that same setup can be used to quietly pull sensitive data out of an ...

Apache Tomcat Path Traversal Vulnerability (CVE-2025-55752) Notice

Overview Recently, NSFOCUS CERT detected that Apache issued a security bulletin to fix the Apache Tomcat path traversal vulnerability (CVE-2025-55752); This vulnerability is a flaw introduced when fixing CVE-2016-5388. Since the rewritten URL is ...

Early reporting helps credit unions stop fraudulent transfers faster

In this Help Net Security interview, Carl Scaffidi, CISO at VyStar Credit Union, discusses how credit unions are adapting to an evolving fraud landscape and strengthening payment security. As cybercriminals leverage social engineering and ...

Product showcase: Syteca – The human-centric insider threat management platform

Most organizations think the greatest danger lurks outside their walls. But statistics keep proving otherwise. According to Verizon’s 2025 Data Breach Investigation Report, 60% of breaches involve the human element. The real risk often ...

Scammers target international students by threatening their visa status

In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a door for scammers. Posing as government officials, police, or university ...

Proximity: Open-source MCP security scanner

Proximity is a new open-source tool that scans Model Context Protocol (MCP) servers. It identifies the prompts, tools, and resources that a server makes available, and it can evaluate how those elements might introduce security risks. The tool ...

MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?

This morning, I tried to power down my Samsung S23 smartphone. Related: Sam Altman seeks to replace the browser I long-pressed the side key expecting the usual “Power off / Restart” menu. Instead, a small Gemini prompt window appeared towards ...

Check Point Allies with NVIDIA to Secure AI Platforms

Check Point Software Technologies Ltd. today revealed it has developed a cybersecurity platform to secure artificial intelligence (AI) factories in collaboration with NVIDIA. Announced at the NVIDIA GTC conference, the AI Cloud Protect platform ...

When the Patches Stop: Protecting Your (Windows 10) Environment with CDR

The post When the Patches Stop: Protecting Your (Windows 10) Environment with CDR appeared first on Votiro. The post When the Patches Stop: Protecting Your (Windows 10) Environment with CDR appeared first on Security Boulevard.

NDSS 2025 – Secure IP Address Allocation At Cloud Scale Session 1B: Internet Security

Authors, Creators & Presenters: Eric Pauley (University of Wisconsin--Madison), Kyle Domico (University of Wisconsin--Madison), Blaine Hoak (University of Wisconsin--Madison), Ryan Sheatsley (University of Wisconsin--Madison), Quinn Burke ...

Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up

Witnesses on the Thai side of the border reported hearing explosions and seeing smoke coming from the center over the past several nights starting on Friday. The post Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as ...

CVE-2025-62725: From “docker compose ps” to System Compromise

Docker Compose powers millions of workflows, from CI/CD runners and local development stacks to cloud workspaces and enterprise build pipelines. It’s trusted by developers as the friendly layer above Docker Engine that turns a few YAML lines ...

PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)

A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache poisoning, allowing them to redirect Internet traffic to potentially ...