Application Security News and Articles
The Bottom Line: We've Crossed the Security Singularity
The Security Singularity: When AI Democratized Cyberattacks
We've crossed a threshold that fundamentally changes cybersecurity forever. Not with fanfare or headlines, but quietly, in ...
2 min readCredentialitis isn’t just a clever name. It’s a real condition plaguing modern IT teams. Dr. Seymour Keys is here to walk you through the symptoms, the screening, and the treatment.
The post We’ve Identified a New IT Ailment. ...
Authentication migrations fail 40% of the time, costing millions in downtime. Learn the strategies security leaders use to avoid disaster, choose the right vendors, and build future-proof identity infrastructure that won't lock you in.
The post ...
After announcing that the cyberattack-caused disruption to factories would continue, Jaguar Land Rover is now confirming a data breach.
The post Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack appeared first on SecurityWeek.
Creator, Author and Presenter: Moses Schwartz
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...
Sofia, Bulgaria, 10th September 2025, CyberNewsWire
The post Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security appeared first on Security Boulevard.
Coro announced the latest version of its platform. Coro 3.6 leverages AI to transform complex security into easy-to-use security for resource-constrained SMBs. Today, SMBs require a solution to enhance their security posture. Coro’s unified ...
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges ...
Geordie has developed a platform that gives enterprises deep visibility into AI agents and what they are doing.
The post Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform appeared first on SecurityWeek.
Picture this: Accounts Payable gets a “new remittance instructions” email from a frequent supplier. The sender name is right, the thread is a real PO reply‑chain, and the tone mirrors past messages. A shift supervisor is warning about ...
The investment will accelerate product innovation and will fuel the security company’s expansion in the US.
The post Red Access Raises $17 Million for Agentless Security Platform appeared first on SecurityWeek.
Discover why startups face the Auth0 “growth penalty.” Learn pricing mechanics, hidden costs, and affordable alternatives for scalable growth.
The post Auth0 Pricing Explained (And Why Startups Call It a Growth Penalty) appeared first on ...
Explore why user safety should be the core of SSO design. Learn how MFA, encryption, and compliance keep authentication secure and trustworthy.
The post Why User Safety Should Be a Core SSO Design Principle appeared first on Security Boulevard.
Apple’s new Memory Integrity Enforcement (MIE) brings always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes.
The post Apple Unveils iPhone Memory Protections to Combat ...
Discover how MFA, SSO, and access controls secure AI video creation in 2025, balancing creativity, compliance, and enterprise-level protection.
The post How Secure Is AI Video Creation? SSO, MFA, and Access Control in 2025 appeared first on ...
On September 2025 Patch Tuesday, Microsoft has released patches for 80+ vulnerabilities in its various software products, but the good news is that none of them are actively exploited. Among the critical and important vulnerabilities patched by ...
Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks. SMS phishing, commonly called “smishing,” is a cyberattack where fraudsters send misleading ...
Tel Aviv–based startup replaces vaults and secrets managers with just-in-time policies, aiming to eliminate credentials entirely.
The post Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform appeared first on ...
High-severity vulnerabilities could lead to remote code execution, privilege escalation, information disclosure, and configuration tampering.
The post Fortinet, Ivanti, Nvidia Release Security Updates appeared first on SecurityWeek.
Volodymyr Tymoshchuk allegedly hit hundreds of organizations with the LockerGoga, MegaCortex, and Nefilim ransomware families.
The post US Offers $10 Million Reward for Ukrainian Ransomware Operator appeared first on SecurityWeek.