Application Security News and Articles
From generative AI tools to pre-trained machine learning models, AI is rapidly transforming how software is developed.
The post How Sonatype leads in AI component analysis for supply chain security appeared first on Security Boulevard.
The Linux Foundation launched the Agent2Agent (A2A) project, an open protocol for secure agent-to-agent communication and collaboration. The A2A protocol is a collaborative effort launched by Google in April and with growing support from more ...
At ColorTokens, we’ve always been about breach readiness by stopping lateral movement through microsegmentation. Our mission is simple. Contain the spread of threats and keep operations running, even during an attack. That’s how we help ...
Author/Presenter: Dmitry Shmulevich (Software Engineer, NVIDIA)
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...
Barracuda Networks launched Barracuda Managed Vulnerability Security. This fully managed service, powered by Barracuda’s global Security Operations Center (SOC), extends the BarracudaONE platform to help organizations proactively identify, ...
ManageEngine launched a MSP Central, a unified platform designed to help MSPs streamline service delivery, device management, threat protection, and infrastructure monitoring from a single interface. ManageEngine focuses on addressing specific ...
Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions.
The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek.
Contrast Security launched Application Detection and Response (ADR) in August of 2024, and now, in a new Gartner research note, ADR is a topic. The 2025 Gartner® Implement Effective Application and API Security Controls (accessible to Gartner ...
Cyberattacks against government agencies are escalating at an alarming pace. From state departments to small municipal offices, public sector organizations have become prime targets for ransomware, credential theft, and increasingly sophisticated ...
DataKrypto and Tumeryk join forces to deliver world’s first secure encrypted guardrails for AI LLMs and SLMs.
The post DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs appeared first ...
Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a lookalike site(s?). The trojanized SonicWall NetExtender installer ...
Threats to retailers will intensify with more ransomware attacks, combined with the security implications of new technologies.
The post Fortifying Retail Security: Practical Steps to Prevent Cyberattacks appeared first on Security Boulevard.
The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.
The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.
Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet.
The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.
A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure.
The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.
AI-powered defenses offer clear strategic advantages for telecom providers and enterprise security teams to help combat vishing attacks.
The post Using AI to Identify Patterns in Vishing Attempts appeared first on Security Boulevard.
A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. The vulnerability has been patched in WinRAR 7.12 beta 1, released on June ...
Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices.
The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.
Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them.
The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams appeared first on SecurityWeek.
The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk of harassment, harm, or coercion. It has the potential to make cybersecurity better and more accessible for billions of ...