Application Security News and Articles


Analysis Sees Limited End User Ability to Accurately Identify Phishing Attacks

An analysis of telemetry data published by Red Canary, a unit of Zscaler, finds only 16% of the tens of thousands of phishing emails reported by end users in the first half of 2025 proved to be actual threats. At the same time, however, the ...

Accelerating Threat-Led Defense with Tidal Cyber + ThreatConnect

Today, cybersecurity programs must go beyond deploying tools. They need to seamlessly integrate threat intelligence into every stage of defensive security for immediate operational impact. Tidal Cyber's Threat-Led Defense Platform includes a deep ...

Randall Munroe’s XKCD ‘Canon’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Canon’ appeared first on Security Boulevard.

Security Wins Only When Institutionalized – Here’s Why! ⎥ Kevan Bard

Discover insights from The Elephant in AppSec episode with Kevan Bard. The post Security Wins Only When Institutionalized – Here’s Why! ⎥ Kevan Bard appeared first on Security Boulevard.

How Trusted Execution Environments Keep Your Digital Life Under Lock and Key

Your firewall can't protect data from rogue admins or compromised systems. TEEs create hardware-secured "safe rooms" inside processors - protecting your most sensitive information even when everything else fails. Here's why every business needs ...

Norway Blames Pro-Russian Group for Hack of Water Dam

Norway's top security and intelligence agencies are accusing pro-Russian hacktivists with a cyberattack in April in which hackers took control of a dam's controls and opened an outflow valve, part of a larger effort by Russia to disrupt ...

It Took a Day for SPLX, NeuralTrust to Jailbreak OpenAI’s GPT-5

A day after OpenAI and Microsoft trumpeted the arrival of the GPT-5 generative AI model and its improved reasoning and other capabilities, two AI cybersecurity startups showed in separate reports that it is still vulnerable to jailbreaking and ...

In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk

Other noteworthy stories that might have slipped under the radar: Canada’s House of Commons hacked, Russia behind court system attack, Pennsylvania AG targeted in cyberattack. The post In Other News: Critical Zoom Flaw, City’s Water ...

Deepfake Detection: What is Phishing 3.0 and How Can You Prepare?

Earlier this year we warned that trust was cracking inside the inbox. Since then your inbox learned a new trick: acting. GenAI no longer just writes the lure; it manufactures the sender. With a few seconds of audio or a handful of images, ...

Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats. The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense ...

Google Says Android pKVM Earns Highest Level of Security Assurance

Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers. The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek.

AI Threats & Adaptive Authentication: How to Be Protected Against Deepfakes and Credential Attacks

Learn how adaptive authentication defends against deepfakes, credential attacks, and AI threats to keep your business secure. The post AI Threats & Adaptive Authentication: How to Be Protected Against Deepfakes and Credential Attacks appeared ...

Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products

Rockwell Automation has published several advisories describing critical and high-severity vulnerabilities affecting its products. The post Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products appeared first on ...

Cisco Patches Critical Vulnerability in Firewall Management Platform

Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products. The post Cisco Patches Critical Vulnerability in Firewall Management Platform appeared first on SecurityWeek.

SquareX at Black Hat and DEF CON: Bring Our Browser Security Research to the World

SquareX at Black Hat and DEF CON: Bringing Our Browser Security Research to the World Team SquareX Takes on Hacker Summer Camp in 2025 With the twin events of Black Hat USA and DEF CON 33, Las Vegas transformed into the cybersecurity capital ...

How I Started Securing My Crypto Accounts with OTP Verification

Learn how OTP verification and unified APIs protect your crypto accounts from hackers while keeping login simple and hassle-free. The post How I Started Securing My Crypto Accounts with OTP Verification appeared first on Security Boulevard.

How military leadership prepares veterans for cybersecurity success

In this Help Net Security interview, Warren O’Driscoll, Head of Security Practice at NTT DATA UK and Ireland, discusses how military leadership training equips veterans with the mindset, resilience, and strategic thinking needed to excel in ...

Using AI Without ISO 42001 Compliance? Here’s What You Risk!

AI or Artificial Intelligence is out here in full swing! But with the right governance, it can transform industries, automate decisions, and power innovations at lightning speed without any casualties. As it is said, with great power comes great ...

Cyber insurance market shows early signs of maturity

The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. Brokers and carriers are taking on different but connected roles to help customers get policies. ...

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with real-world systems. ...