Application Security News and Articles


We’ve crossed the security singularity | Impart Security

The Bottom Line: We've Crossed the Security Singularity ‍ The Security Singularity: When AI Democratized Cyberattacks We've crossed a threshold that fundamentally changes cybersecurity forever. Not with fanfare or headlines, but quietly, in ...

We’ve Identified a New IT Ailment. It’s Called Credentialitis – And It’s Spreading Fast

2 min readCredentialitis isn’t just a clever name. It’s a real condition plaguing modern IT teams. Dr. Seymour Keys is here to walk you through the symptoms, the screening, and the treatment. The post We’ve Identified a New IT Ailment. ...

Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night

Authentication migrations fail 40% of the time, costing millions in downtime. Learn the strategies security leaders use to avoid disaster, choose the right vendors, and build future-proof identity infrastructure that won't lock you in. The post ...

Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack

After announcing that the cyberattack-caused disruption to factories would continue, Jaguar Land Rover is now confirming a data breach. The post Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack appeared first on SecurityWeek.

BSidesSF 2025: Trawling For IOCs: Catching C2 In A Sea Of Data

Creator, Author and Presenter: Moses Schwartz Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security

Sofia, Bulgaria, 10th September 2025, CyberNewsWire The post Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security appeared first on Security Boulevard.

Coro 3.6 reduces operational burden for resource-constrained SMBs

Coro announced the latest version of its platform. Coro 3.6 leverages AI to transform complex security into easy-to-use security for resource-constrained SMBs. Today, SMBs require a solution to enhance their security posture. Coro’s unified ...

New Tenable Report: How Complexity and Weak AI Security Put Cloud Environments at Risk

This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges ...

Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform

Geordie has developed a platform that gives enterprises deep visibility into AI agents and what they are doing. The post Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform appeared first on SecurityWeek.

Supply Chain Security Starts From Within the Inbox

Picture this: Accounts Payable gets a “new remittance instructions” email from a frequent supplier. The sender name is right, the thread is a real PO reply‑chain, and the tone mirrors past messages. A shift supervisor is warning about ...

Red Access Raises $17 Million for Agentless Security Platform

The investment will accelerate product innovation and will fuel the security company’s expansion in the US. The post Red Access Raises $17 Million for Agentless Security Platform appeared first on SecurityWeek.

Auth0 Pricing Explained (And Why Startups Call It a Growth Penalty)

Discover why startups face the Auth0 “growth penalty.” Learn pricing mechanics, hidden costs, and affordable alternatives for scalable growth. The post Auth0 Pricing Explained (And Why Startups Call It a Growth Penalty) appeared first on ...

Why User Safety Should Be a Core SSO Design Principle

Explore why user safety should be the core of SSO design. Learn how MFA, encryption, and compliance keep authentication secure and trustworthy. The post Why User Safety Should Be a Core SSO Design Principle appeared first on Security Boulevard.

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks

Apple’s new Memory Integrity Enforcement (MIE) brings always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes. The post Apple Unveils iPhone Memory Protections to Combat ...

How Secure Is AI Video Creation? SSO, MFA, and Access Control in 2025

Discover how MFA, SSO, and access controls secure AI video creation in 2025, balancing creativity, compliance, and enterprise-level protection. The post How Secure Is AI Video Creation? SSO, MFA, and Access Control in 2025 appeared first on ...

Microsoft, Adobe, SAP deliver critical fixes for September 2025 Patch Tuesday

On September 2025 Patch Tuesday, Microsoft has released patches for 80+ vulnerabilities in its various software products, but the good news is that none of them are actively exploited. Among the critical and important vulnerabilities patched by ...

Lookout’s AI-powered solution combats SMS phishing attacks

Lookout introduces Smishing AI, an AI-powered solution designed to protect enterprises from the growing threat of SMS phishing (smishing) attacks. SMS phishing, commonly called “smishing,” is a cyberattack where fraudsters send misleading ...

Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform

Tel Aviv–based startup replaces vaults and secrets managers with just-in-time policies, aiming to eliminate credentials entirely. The post Hush Security Emerges Stealth to Eliminate Credential Threats With No-Secrets Platform appeared first on ...

Fortinet, Ivanti, Nvidia Release Security Updates

High-severity vulnerabilities could lead to remote code execution, privilege escalation, information disclosure, and configuration tampering. The post Fortinet, Ivanti, Nvidia Release Security Updates appeared first on SecurityWeek.

US Offers $10 Million Reward for Ukrainian Ransomware Operator

Volodymyr Tymoshchuk allegedly hit hundreds of organizations with the LockerGoga, MegaCortex, and Nefilim ransomware families. The post US Offers $10 Million Reward for Ukrainian Ransomware Operator appeared first on SecurityWeek.