Application Security News and Articles


Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with real-world systems. ...

Fighting fraud with AI: The new identity security playbook

In this Help Net Security video, Hal Lonas, CTO at Trulioo, talks about the rise of synthetic identity fraud and how it’s quickly becoming one of the biggest threats in financial crime. He breaks down how fraudsters are using generative AI ...

Employees race to build custom AI apps despite security risks

The latest Netskope findings show a 50% increase in GenAI platform usage among enterprise end-users, driven by growing employee demand for tools to develop custom AI applications and agents. Top LLM interfaces by percentage in organizations ...

New infosec products of the week: August 15, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Brivo, Envoy, Prove, Rubrik, and Trellix. Rubrik Agent Rewind enables organizations to undo mistakes made by agentic AI Agent Rewind, powered by ...

Mastering the Channel Ecosystem — Lessons From our BlackHat Panel

Thanks to everyone who joined the panel at the BlackHat Innovators & Investors Summit — it was a fast, practical session and full of real, repeatable advice. Below I’ve distilled the conversation into the speakers and the most actionable ...

The Cost of NYDFS Cybersecurity Noncompliance: What You Need to Know in 2025

The New York State Department of Financial Services (NYDFS) has long been a leader in setting cybersecurity standards for the financial services and insurance sectors. Under 23 NYCRR Part 500, regulated entities are required to implement a ...

Post-Incident CRM Forensics: Why Deploying AppOmni Is a Best Practice

OAuth abuse exposes SaaS data. AppOmni’s threat detection and security posture management shut it down. The post Post-Incident CRM Forensics: Why Deploying AppOmni Is a Best Practice appeared first on AppOmni. The post Post-Incident CRM ...

Adapting to New Cloud Security Challenges

Are Organizations Truly Prepared for New Cloud Security Challenges? With businesses increasingly shift to cloud-based infrastructures, the question lingers: are organizations genuinely adapting to emerging cloud security challenges? The rise of ...

Boosting Independence with Advanced Secrets Scanning

Is Your Organization Truly Independent in Terms of Security? A sense of independence can often be elusive for organizations expressing intent to have complete control over their cybersecurity. To achieve this, businesses must consider an ...

BSidesSF 2025: Don’t Trust, Verify! – How I Found A CSRF Bug Hiding In Plain Sight

Creator, Author and Presenter: Patrick O'Doherty Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Act Surprised: Data Brokers Seem to Scoff at California Privacy Act

Privacy Rights Crushed by robots.txt: Sen. Hassan is on the warpath. The post Act Surprised: Data Brokers Seem to Scoff at California Privacy Act appeared first on Security Boulevard.

The Vulnerability Multiverse: Only Proactive Training Can Keep It Together

In a world where code moves faster than ever and threat actors adapt in milliseconds, securing software can feel like navigating a multiverse of possible failures. One path leads to clean, secure releases. Another leads to breach headlines. And ...

The AI Browser Revolution: Rethinking Web Architecture

AI-powered browsers are making it harder to tell humans from bots. Discover why this shift could change the future of online security. The post The AI Browser Revolution: Rethinking Web Architecture appeared first on Security Boulevard.

GDPR and AI: Mastering EU AI Act Compliance

The post GDPR and AI: Mastering EU AI Act Compliance appeared first on Sovy. The post GDPR and AI: Mastering EU AI Act Compliance appeared first on Security Boulevard.

From Vulnerabilities to Exposures: Cyber Risk Lessons from the 2025 DBIR

Cybersecurity teams are drowning in CVEs — and attackers are counting on it. In our recent webinar, Inside the 2025 DBIR – From Vulnerabilities to Exposure, experts from Verizon and Balbix broke down this year’s Data Breach Investigations ...

Why the Browser Is Becoming a Prime Security Battleground

At Black Hat, Push Security co-founder and CTO Tyron Erasmus talks about why attackers are increasingly shifting their focus from endpoints to browsers — and what that means for defenders. Erasmus, who began his career in penetration testing ...

What Is Zero Trust, Really?

Zero Trust. It’s the security buzzword of the decade, right up there with “AI-powered” and “next-gen.” Vendors slap it on everything from VPN replacements to microsegmentation tools. Analysts write about... The post What Is Zero Trust, ...

BSidesSF 2025: AI Won’t Help You Here

Creator, Author and Presenter: (Ian Amit) Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

The Cloud Edge Is Strong – But Your Network Is the Weakest Link

The New Network Frontier: Edge Computing and the Crisis of Connectivity Editor's note: This is the first post in a four-part series exploring the architectural gaps, strategic risks, and emerging models shaping the future of edge networking. In ...

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Path traversal and XXE injection flaws allowing unauthenticated remote code execution have been patched in Xerox FreeFlow Core.  The post Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution appeared first on ...