Application Security News and Articles


CrowdStrike Extends AI Security Ambitions Beyond Operations to Include Workloads

CrowdStrike at its Fal.Con event today expanded its effort to embed artificial intelligence (AI) agents into security operations center (SOC) workflows and while simultaneously extending its ability to secure AI applications by acquiring Pangea ...

Be Breach Ready: How ColorTokens Xshield Stops Cyber Threats Before They Spread

Each week, new operating system vulnerabilities are disclosed. The same alerts landing in your inbox are also fueling hacker research, as they look for the fastest way to exploit these newfound system weaknesses.  We even have one vendor that is ...

Jaguar Land Rover Admits to Longer Shutdown as Childish Hackers Troll Carmaker

JLR vs. SLH: Jaguar Land Rover woes worse than previously thought. The post Jaguar Land Rover Admits to Longer Shutdown as Childish Hackers Troll Carmaker appeared first on Security Boulevard.

Managing AI Risks in the Modern Software Supply Chain

Artificial Intelligence (AI) and Machine Learning (ML) continue to reshape software development at an unprecedented pace. Platforms like Hugging Face make millions of pre-trained models easily accessible, enabling faster innovation and powerful ...

No More Blind Spots: Achieving Complete SDLC Visibility in a Multi-Cloud World

Struggling with a messy, multi-cloud environment? Learn how Tenable’s unified cloud security approach helps you eliminate dangerous blind spots, attain complete visibility and control, and secure your assets from the first line of code to full ...

Code Security for Conversational AI: Uncovering a Zip Slip in EDDI

Learn how SonarQube identified a Zip Slip vulnerability (CVE-2025-32779) in EDDI, an open-source conversational AI middleware. The post Code Security for Conversational AI: Uncovering a Zip Slip in EDDI appeared first on Security Boulevard.

DEF CON 33: DDOS Community

Creators, Authors and Presenters: d3dbot, DDoS Community Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the ...

What is an Internal Developer Platform (IDP)?

An Internal Developer Platform (IDP) is a foundational concept in modern software engineering. It acts as a bridge between developers and the underlying infrastructure, tools, and processes needed to build, deploy, and manage software ...

DigiCert Acquires Valimail to Add Email Authentication Service

DigiCert acquires Valimail to strengthen email authentication with DMARC and content protection, to fight phishing and AI-driven threats. The post DigiCert Acquires Valimail to Add Email Authentication Service appeared first on Security Boulevard.

Security Analytics Firm Vega Emerges From Stealth With $65M in Funding 

Vega provides security analytics and operations solutions designed to help organizations detect and respond to threats. The post Security Analytics Firm Vega Emerges From Stealth With $65M in Funding  appeared first on SecurityWeek.

NPM Ecosystem Under Siege: Self-Propagating Malware Compromises 187 Packages in a Huge Supply Chain Attack

A major NPM breach exposed 187 packages. The post NPM Ecosystem Under Siege: Self-Propagating Malware Compromises 187 Packages in a Huge Supply Chain Attack appeared first on Security Boulevard.

Sentra enables organizations to leverage Copilot without compromising security

Sentra launched its solution for securing Microsoft 365 Copilot, enabling organizations to adopt Copilot with confidence while remaining compliant and protecting sensitive enterprise data. The solution allows organizations to prevent overexposure ...

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

Tel Aviv, Israel-based Ray Security emerged from stealth with $11 million seed funding and a desire to change the way corporate data is protected. The funding was co-led by Venture Guides and Ibex Investors. The post Ray Security Emerges From ...

Beyond robots.txt: Exposing the cracks in AI agent policy enforcement

AI agents often ignore robots.txt and can be manipulated via prompts—exposing real risks to content, privacy, and site security. DataDome gives you visibility and control over AI traffic. The post Beyond robots.txt: Exposing the cracks in AI ...

Neon Cyber exits stealth with Workforce Cybersecurity Platform

Neon Cyber announced its emergence from stealth and unveiled the first Workforce Cybersecurity Platform (WCP), delivering protection across browsers, SaaS applications and enterprise systems in every department. Built by cybersecurity veterans ...

9 CodeRabbit Alternatives for Faster AI Code Reviews

Code reviews are a pain, right? Let’s be real…going through pull requests, catching bugs, and making sure your code doesn’t break…Continue reading on Medium »

Digital.ai brings expert-level cryptography to any developer team

Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured. The Agent makes white-box cryptography, long considered ...

Eve Security Launches AI Platform to Secure AI Agent Interactions

Eve Security today made available an observability and policy enforcement platform that is designed to use artificial intelligence (AI) agents to ensure that other AI agents are not accessing IT resources without permission. Fresh off raising $3 ...

Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

The notorious cybercrime groups claim they are going dark, but experts believe they will continue their activities. The post Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims appeared first on SecurityWeek.

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake you make. The latest Akira ransomware attacks Managed security service providers and external ...