Application Security News and Articles


How Sonatype leads in AI component analysis for supply chain security

From generative AI tools to pre-trained machine learning models, AI is rapidly transforming how software is developed. The post How Sonatype leads in AI component analysis for supply chain security appeared first on Security Boulevard.

Linux Foundation launches Agent2Agent, a protocol that enables agentic AI interoperability

The Linux Foundation launched the Agent2Agent (A2A) project, an open protocol for secure agent-to-agent communication and collaboration. The A2A protocol is a collaborative effort launched by Google in April and with growing support from more ...

Maximize ROI from Your CrowdStrike Deployment

At ColorTokens, we’ve always been about breach readiness by stopping lateral movement through microsegmentation. Our mission is simple. Contain the spread of threats and keep operations running, even during an attack. That’s how we help ...

LinuxFest Northwest: Maximizing AI Potential Optimization Techniques for Smarter Faster Systems

Author/Presenter: Dmitry Shmulevich (Software Engineer, NVIDIA) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...

Barracuda Managed Vulnerability Security identifies and prioritizes vulnerabilities

Barracuda Networks launched Barracuda Managed Vulnerability Security. This fully managed service, powered by Barracuda’s global Security Operations Center (SOC), extends the BarracudaONE platform to help organizations proactively identify, ...

ManageEngine helps MSPs manage day-to-day operations

ManageEngine launched a MSP Central, a unified platform designed to help MSPs streamline service delivery, device management, threat protection, and infrastructure monitoring from a single interface. ManageEngine focuses on addressing specific ...

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek.

Application and API Security Can’t Rely Solely on Perimeter Defenses or Scanners | Notes on Gartner AppSec Research | Contrast Security

Contrast Security launched Application Detection and Response (ADR) in August of 2024, and now, in a new Gartner research note, ADR is a topic. The 2025 Gartner® Implement Effective Application and API Security Controls (accessible to Gartner ...

The Security Fallout of Cyberattacks on Government Agencies

Cyberattacks against government agencies are escalating at an alarming pace. From state departments to small municipal offices, public sector organizations have become prime targets for ransomware, credential theft, and increasingly sophisticated ...

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs

DataKrypto and Tumeryk join forces to deliver world’s first secure encrypted guardrails for AI LLMs and SLMs. The post DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs appeared first ...

Trojanized SonicWall NetExtender app exfiltrates VPN credentials

Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a lookalike site(s?). The trojanized SonicWall NetExtender installer ...

Fortifying Retail Security: Practical Steps to Prevent Cyberattacks 

Threats to retailers will intensify with more ransomware attacks, combined with the security implications of new technologies. The post Fortifying Retail Security: Practical Steps to Prevent Cyberattacks  appeared first on Security Boulevard.

Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives

The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk. The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.

Prometei Botnet Activity Spikes

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.

Chinese APT Hacking Routers to Build Espionage Infrastructure

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.

Using AI to Identify Patterns in Vishing Attempts

AI-powered defenses offer clear strategic advantages for telecom providers and enterprise security teams to help combat vishing attacks. The post Using AI to Identify Patterns in Vishing Attempts appeared first on Security Boulevard.

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)

A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. The vulnerability has been patched in WinRAR 7.12 beta 1, released on June ...

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices. The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams 

Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them. The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  appeared first on SecurityWeek.

Common Good Cyber Fund launches to support nonprofits protecting the internet

The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk of harassment, harm, or coercion. It has the potential to make cybersecurity better and more accessible for billions of ...