Application Security News and Articles


Prosper Marketplace Data Breach Expands: 17.6 Million Users Impacted in Database Intrusion

In a significant development in one of the year’s largest fintech breaches, new reports released today confirm that Prosper Marketplace, the San Francisco–based peer-to-peer lending platform, suffered a data compromise affecting roughly 17.6 ...

Blog: From Review to Rollout: Effective Strategies for Updating Policies and Procedures

Key Takeaways Strong governance depends on current, coherent, and well-implemented policies. They define how decisions are made, risks are managed, and accountability is enforced. Yet, policy management remains one of the least mature governance ...

What is an Autonomous SOC? The Future of Security Operations Centers

The post What is an Autonomous SOC? The Future of Security Operations Centers appeared first on AI Security Automation. The post What is an Autonomous SOC? The Future of Security Operations Centers appeared first on Security Boulevard.

News Alert: SquareX reveals new browser threat — AI sidebars cloned to exploit user trust

PALO ALTO, Calif., Oct.  23, 2025, CyberNewswire: SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar ...

Capable Defenses Against Advanced Threats

How Can Organizations Fortify Their Cybersecurity with Non-Human Identities? Where automation is ubiquitous, how can organizations ensure their systems remain secure against sophisticated threats? The answer lies in managing Non-Human Identities ...

Justify Your Investment in Cybersecurity

Are Your Cybersecurity Investments Justified? Where organizations increasingly shift to cloud computing, the debate over justified spending on cybersecurity has never been more pertinent. With the rise of Non-Human Identities (NHIs) and Secrets ...

SIEM Solutions

Security Information and Event Management (SIEM) has long been the backbone of enterprise security operations—centralizing log collection, enabling investigation, and supporting compliance. But traditional SIEM deployments are often expensive, ...

6 Takeaways from “The Rise of AI Fraud” Webinar: How AI Agents Are Rewriting Fraud Defense in 2025

Learn how AI agents are redefining online fraud in 2025. Explore the 6 key takeaways from the Loyalty Security Alliance’s “Rise of AI Fraud” webinar. The post 6 Takeaways from “The Rise of AI Fraud” Webinar: How AI Agents Are Rewriting ...

NDSS 2025 – Symposium on Usable Security and Privacy (USEC) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Afternoon, Session 3

Authors, Creators & Presenters: PAPERS Vision: Retiring Scenarios -- Enabling Ecologically Valid Measurement in Phishing Detection Research with PhishyMailbox Oliver D. Reithmaier (Leibniz University Hannover), Thorsten Thiel (Atmina ...

Keeping Up with Cloud Security: Updates to Our AWS Assessments

AttackIQ has enhanced and expanded two AWS security assessments, by introducing nine new scenarios that emulate real-world techniques and tactics that could be used by threat actors to compromise AWS cloud environments. These updates are designed ...

One Policy for Every File

The post One Policy for Every File appeared first on Votiro. The post One Policy for Every File appeared first on Security Boulevard.

When “It’s Always DNS” Becomes Your Security Advantage

Every network engineer knows the refrain: “It’s always DNS.” When websites won’t load, applications fail to connect, or mysterious outages emerge, the Domain Name System—the internet’s essential address book—is usually involved. For ...

Why Cybersecurity Needs Continuous Exposure Management

Alan sits down with Himanshu Kathpal to discuss how modern cybersecurity teams are evolving from reactive defense to proactive exposure management. They explore why traditional approaches to risk reduction—built around scanning, alerting, and ...

Closing the Loop: The Future of Automated Vulnerability Remediation

At Qualys ROCon 2025, Alan catches up with Eran Livne, senior director of endpoint remediation at Qualys, to discuss how organizations are evolving from vulnerability detection to true automated remediation. Livne, who helped build Qualys’ ...

Elon Musk’s SpaceX ‘is Facilitating’ Scams via Starlink

Low Earth Pork: Pig-butchering scammers in Myanmar lose use of 2,500 Starlink terminals. The post Elon Musk’s SpaceX ‘is Facilitating’ Scams via Starlink appeared first on Security Boulevard.

Turning Data Security from a Cost Center into a Growth Enabler with TAMUNIO

The security function has often been at odds with the rest of the business. While the latter guns for growth, CISOs have historically been seen as more interested in managing cyber risk than supporting their colleagues. Sometimes this can lead to ...

DTTS | Zero Trust DNS Enforcement: Policy Violation Management

In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, ...

Introducing Multi-User Testing with Natural Language Queries in Escape DAST

Secure your multi-tenant SaaS applications with Escape DAST’s powerful multi-user testing and tenant isolation features. The post Introducing Multi-User Testing with Natural Language Queries in Escape DAST appeared first on Security Boulevard.

NDSS 2025 – Symposium on Usable Security and Privacy (USEC) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium & Keynote

Author, Creator & Presenter: Dr. Patrick Gage Kelley PhD Dr. Patrick Gage Kelley is the Head of Research Strategy for Trust & Safety at Google. He has worked on projects that help us better understand how people think about their data and ...

Russian Government Now Actively Managing Cybercrime Groups: Security Firm

The relationship between the Russian government and cybercriminal groups has evolved from passive tolerance. The post Russian Government Now Actively Managing Cybercrime Groups: Security Firm appeared first on SecurityWeek.