Application Security News and Articles


N-able’s Cat-MIP standardizes terminology for AI automation

N-able has introduced Cat-MIP, a solution designed to standardize and document terminology for AI automation and MCP Server behaviors across MSP and IT ecosystems. This breakthrough enables IT service providers to harness AI more effectively for ...

UK Train Operator LNER Warns Customers of Data Breach

LNER said the security incident involved a third-party supplier and resulted in contact information and other data being compromised. The post UK Train Operator LNER Warns Customers of Data Breach appeared first on SecurityWeek.

Box Shield Pro monitors AI workflows and sensitive data

Box announced Box Shield Pro, a new suite of security capabilities powered by AI, that builds on the company’s flagship content protection solution, Box Shield. With Box Shield Pro, customers can automatically apply AI-driven classification, ...

Critical Chrome Vulnerability Earns Researcher $43,000

Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek.

Permiso Uncovers Unicode Technique to Compromise Microsoft Exchange Rules

Permiso researchers uncovered a Unicode obfuscation technique, “Inboxfuscation,” that exploits Microsoft Exchange inbox rules to evade detection and exfiltrate email data. Learn how it works and how security teams can defend against it. The ...

Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s ...

Wyden Asks FTC to Investigate Microsoft’s ‘Gross Cybersecurity Negligence’

For the second time in two years, Senator Ron Wyden is asking federal regulators to investigate Microsoft's cybersecurity practices, saying the ongoing weaknesses in the Windows OS is making federal agencies, critical infrastructure, and ...

How Exposure Management and Cyber Risk Quantification Power CTEM

If you’ve been anywhere near cybersecurity leadership circles lately, you’ve probably heard the acronym CTEM tossed around a lot. Continuous Threat Exposure Management promises a framework for staying ahead of an endlessly shifting attack ...

Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw

The Akira ransomware group is likely exploiting a combination of three attack vectors to gain unauthorized access to vulnerable appliances. The post Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw appeared first on ...

UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features

Researchers exploited K2 Think’s built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist. The post UAE’s K2 Think AI Jailbroken Through Its Own ...

100,000 Impacted by Cornwell Quality Tools Data Breach 

The tools manufacturer was targeted in a ransomware attack claimed by the Cactus group. The post 100,000 Impacted by Cornwell Quality Tools Data Breach  appeared first on SecurityWeek.

Senator Urges FTC Probe of Microsoft Over Security Failures

Senator Ron Wyden’s complaints focus on Windows security and the Kerberoasting attack technique.  The post Senator Urges FTC Probe of Microsoft Over Security Failures appeared first on SecurityWeek.

AI Emerges as the Hope—and Risk—for Overloaded SOCs

With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triage—but without human oversight, it risks becoming part of the problem. The post AI Emerges as the ...

Email Security Startup AegisAI Launches With $13 Million in Funding

AegisAI uses autonomous AI agents to prevent phishing, malware, and BEC attacks from reaching inboxes. The post Email Security Startup AegisAI Launches With $13 Million in Funding appeared first on SecurityWeek.

Inside Wallarm Security Edge: Instant Protection at the API Edge

APIs are now the beating heart of digital infrastructure. But as they have risen in importance, they’ve also become prime targets for attackers. Complex, often poorly understood API behaviors present rich opportunities for exploitation, and too ...

Default Cursor setting can be exploited to run malicious code on developers’ machines

An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code on users’ computers, researchers have warned. An exploitable vulnerability in the Cursor AI editor Cursor ...

Top Identity and Access Management (IAM) Solutions for 2025

Discover 25 top Identity and Access Management (IAM) solutions for 2025. Streamline access, enhance security, and find the perfect fit for your organization. The post Top Identity and Access Management (IAM) Solutions for 2025 appeared first on ...

How to Cut Your Auth0 Bill by 70% Without Losing Enterprise Features

Learn how to cut your Auth0 bill by 70% without losing enterprise features. Explore flat-rate IAM with SSOJet for predictable pricing and growth. The post How to Cut Your Auth0 Bill by 70% Without Losing Enterprise Features appeared first on ...

What is Web Application Security?

Web application security is the practice of protecting websites, online services, and applications from cyber threats that exploit vulnerabilities in their code, configurations, or design. It involves a combination of tools, processes, and best ...

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek.