Application Security News and Articles


Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data ...

Best Application Security Testing Services to Know

Discover the best Application Security Testing (AST) services in 2025. The post Best Application Security Testing Services to Know appeared first on Security Boulevard.

KubeCon + CloudNativeCon North America 2025 — Must-See Sessions

KubeCon + CloudNativeCon North America 2025 is almost here, and whether you’re a cloud-native newcomer, seasoned SRE, or Kubernetes fan, Atlanta will be full of energy this month. The conference isn’t just for hardcore technologists, either. ...

NDSS 2025 – Safety Misalignment Against Large Language Models

SESSION Session 2A: LLM Security Authors, Creators & Presenters: Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong Kong University of Science and Technology (Guangzhou)), Tianshuo Cong (Tsinghua University), ...

CMMC 2.0 in Action: Operationalizing Secure Software Practices Across the Defense Industrial Base

For years, the DoD has lost sensitive Controlled Unclassified Information (CUI) through breaches in the Defense Industrial Base (DIB). Adversaries targeted smaller, less secure subcontractors to steal valuable intellectual property tied to ...

Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns

Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection. The post Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns appeared first on SecurityWeek.

Komodor’s self-healing capabilities remediate issues with or without a human in the loop

Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments. Powered by Klaudia, purpose-built agentic AI, the Komodor ...

Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end

Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers ...

Kasada Named Finalist in AFR BOSS Most Innovative Companies List

Honored by The Australian Financial Review’s 14th annual awards in the Technology category The post Kasada Named Finalist in AFR BOSS Most Innovative Companies List appeared first on Security Boulevard.

The Hidden Authorization Tax: Why Your Permissions System Costs More Than You Think

Every application needs authorization. It’s the backbone that decides who can access what, when, and under which conditions. But the hard part isn’t granting permissions, it’s getting them right. If permissions are too coarse, users lose ...

Barracuda Assistant accelerates security operations

Barracuda Networks launched Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber resilience and drive ...

How penetration testing services prove security and build client trust

In a world where data breaches continue to rise, organisations have become more discerning about who they trust with their information. It is no longer enough to claim that security is a priority — businesses must be able to prove it. ...

Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

Get practical strategies to help minimize your risk exposure, including the need for identity threat detection and mitigation. The post Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders appeared first on ...

CleanStart SBOM Analyzer strengthens software supply chain security

CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping ...

7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution

Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision. Key ...

Flare Raises $30 Million for Threat Exposure Management Platform

The company plans to advance its identity exposure management capabilities and pursue M&A opportunities. The post Flare Raises $30 Million for Threat Exposure Management Platform appeared first on SecurityWeek.

Security Experts Charged with Launching BlackCat Ransomware Attacks

Two former cybersecurity pros were indicted with conspiring with a third unnamed co-conspirator of using the high-profile BlackCat ransomware to launch attacks in 2023 against five U.S. companies to extort payment in cryptocurrency and then ...

Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation

Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO. The post Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation appeared first on SecurityWeek.

Malanta Emerges from Stealth With $10 Million Seed Funding

Malanta collects and analyzes digital breadcrumbs that attackers leave behind and then forecasts how and when they will be weaponized. The post Malanta Emerges from Stealth With $10 Million Seed Funding appeared first on SecurityWeek.

Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)

On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet’s CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in ...