Application Security News and Articles
Proxmox Virtual Environment (VE) 9.0 introduces advancements in both storage and networking capabilities, addressing critical enterprise demands. A highlight is the long-awaited support for snapshots on thick-provisioned LVM shared storage, ...
DaVita has notified over 1 million individuals that their personal and health information was stolen in a ransomware attack.
The post Over 1 Million Impacted by DaVita Data Breach appeared first on SecurityWeek.
The Black Hat Conference has always been a harbinger of where security is headed next. This year, predictably, the conversation is dominated by AI — AI-enhanced threats, AI-driven defenses, AI-this, AI-that. But amid all the artificial ...
SpyCloud has introduced enhancements to its SaaS Investigations solution, integrating advanced AI-powered insights that mirror the tradecraft of SpyCloud’s seasoned investigators. Building on the foundation of its IDLink identity analytics, ...
Unauthenticated command injection vulnerabilities (CVE-2025-54948, CVE-2025-54987) affecting the on-premise version of Trend Micro’s Apex One endpoint security platform are being probed by attackers, the company has warned on Wednesday. ...
ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login bypass.
The post Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass appeared first on SecurityWeek.
Descope launched Agentic Identity Control Plane, a solution that enables security teams to institute policy-based governance, auditing, and identity management for their AI agent and Model Context Protocol (MCP) ecosystems. The Agentic Identity ...
MIND announced the general availability of the first autonomous DLP platform, enabling security teams to safely use GenAI, go beyond compliance, and automate data protection across all IT environments by reducing manual work and preventing ...
Black Kite has unveiled the Adversary Susceptibility Index (ASI), a tool designed for TPRM teams to proactively identify which vendors are most vulnerable to specific threat actors before threats escalate into breaches. “With high-profile ...
Explore the top IAM platforms with MojoAuth. Ensure secure access and protect your enterprise with advanced identity and access management solutions.
The post Top IAM Platforms for Secure Access | MojoAuth appeared first on Security Boulevard.
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 2) appeared first on SecurityWeek.
In many automotive companies, the same systems-engineering teams are responsible for both safety and security. As a result, cybersecurity is treated as a subset of safety, undergirded by an implicit assumption: “If it’s safe, it must be ...
Adobe has released urgent security updates to resolve two AEM Forms vulnerabilities for which proof-of-concept (PoC) code exists.
The post Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC appeared first on SecurityWeek.
Learn how tutoring platforms protect student and parent logins with secure authentication like SSO, MFA, and adaptive login systems.
The post How Can Tutoring Platforms Protect Student and Parent Logins with Secure Authentication? appeared first ...
Cyware has released Cyware MCP Server (Model Context Protocol Server) to advance the future of AI-powered cyber defense. The new open-source capability is purpose-built to enable generative AI-native workflows, allowing seamless integration ...
Sysdig has unveiled an agentic cloud security platform. With Sysdig’s autonomous AI agents, designed to analyze cloud environments end to end and surface hidden business risks, organizations can remediate threats in minutes and deliver ...
Forter has launched Identity Monitoring for agentic commerce, the first in a series of new capabilities that enable ecommerce enterprises to recognize both bot and human behavior and confidently trust AI agents from discovery through payment. ...
Public sector organizations face rising cybersecurity, compliance, and operational challenges, especially in complex hybrid environments. Private certificate authorities (CAs) offer enhanced control, automation, and security tailored to internal ...
A leader’s guide on deploying AI agents – from selecting use cases and establishing governance, to safety controls and showing the value.
The post AI Agents in Cybersecurity: A Practical Roadmap for Leaders appeared first on Security Boulevard.
HPE announced expansion of its cybersecurity, resiliency, and compliance solutions, taking a multi-layered approach to protect enterprises through industry-leading data, network, and system security. HPE is introducing its combined secure ...