Application Security News and Articles


Anthropic Report Shows Bad Actors Abusing Claude in Attacks

A recent report from AI giant Anthropic outlined multiple instances where threat actors abused its Claude LLM in their nefarious activities, including one in which a hacker automated every aspect of a data extortion campaign, from initial ...

How Augusta County Public Schools Protects Students Beyond Web Filtering with Cloud Monitor

Cloud Monitor Uncovers Hidden Student Safety Risks in Google Workspace that Web Filters Miss Augusta County Public Schools in Verona, Virginia, serves approximately 10,000 students and 1,700 faculty and staff. The district is primarily a Google ...

Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace

Las Vegas, United States, 16th September 2025, CyberNewsWire The post Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace appeared first on Security Boulevard.

Neon Cyber Emerges From Stealth, Shining a Light Into the Browser

Neon Cyber argues that phishing, social engineering, and insider threats demand protections that follow users into the browser, where most attacks now begin. The post Neon Cyber Emerges From Stealth, Shining a Light Into the Browser appeared ...

Rowhammer Attack Demonstrated Against DDR5

Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes. The post Rowhammer Attack Demonstrated Against DDR5 appeared first on SecurityWeek.

N-able strengthens backup threat protection

N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove’s defense against cyberthreats, this service is built into Cove’s architecture with no additional ...

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails. The post ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails appeared first on SecurityWeek.

Cyber Essentials certification: What business need to know

Cyber security is essential. Cyber attacks can have devastating consequences for all businesses, regardless of size, including financial losses, reputational damage and loss of customer trust. Cyber Essentials accreditation can help you improve ...

Master regulatory compliance: Dominate change before it dominates you

Change is no longer the exception; it’s the baseline. As we move into 2025, regulatory compliance is morphing faster than many organizations anticipated. New laws, shifting political priorities, disruptive technologies such as AI and IoT, and ...

Fraud Prevention Company SEON Raises $80 Million in Series C Funding

The company will invest in its AI and real-time detection platform, in global expansion, and in strategic partnerships. The post Fraud Prevention Company SEON Raises $80 Million in Series C Funding appeared first on SecurityWeek.

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when current encryption may no longer be safe. What GitHub is changing GitHub has introduced a new type of SSH key ...

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms. The post Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities appeared first on SecurityWeek.

Endpoint Security Firm Remedio Raises $65 Million in First Funding Round

The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management. The post Endpoint Security Firm Remedio Raises $65 Million in First Funding Round ...

Innovation at Velocity: How Fractional Engineering Teams Accelerate AI Roadmaps

Your AI roadmap isn’t stuck because of bad ideas.It’s stuck because you’re building it with the wrong engine. Most enterprise agile IT teams were built...Read More The post Innovation at Velocity: How Fractional Engineering Teams Accelerate ...

Salt Security secures AI agent actions across enterprise APIs

Salt Security introduced a new solution designed to secure the actions AI agents take within the enterprise. As large organizations adopt agentic AI, agents are increasingly making real-time API calls through protocols like MCP and A2A, creating ...

Passwordless Authentication in Healthcare: Protecting Patient Data

Discover how passwordless authentication protects patient data, boosts compliance, and streamlines workflows in modern healthcare systems. The post Passwordless Authentication in Healthcare: Protecting Patient Data appeared first on Security ...

The Impact of Google’s JavaScript SERPs and AI Search on eCommerce Businesses

Google’s search engine results pages now require JavaScript, effectively “hiding” the listings from organic rank trackers, artificial intelligence models, and o The post The Impact of Google’s JavaScript SERPs and AI Search on eCommerce ...

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the lessons that can be learned from leading regions. He points out that good engineering usually leads to strong ...

How AI is Transforming Compliance Management?

Compliance management has seen a major transformation over the years, shifting from manual, paper-heavy processes to technology-driven approaches. In the past, organizations depended heavily on paperwork and human oversight to stay compliant, a ...

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential privacy techniques to prevent individual data points from being exposed, which makes it safer for handling ...