Application Security News and Articles


Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience

Spektrum Labs has raised $10 million in seed funding for its cyber resilience platform. The post Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience appeared first on SecurityWeek.

Minimize the Vulnerability Blast Radius in the Cloud

Tenable Cloud Security unifies visibility across code, build, and runtime stages. It correlates vulnerabilities, identities, and misconfigurations to prioritize exploitability and automate containment — helping teams detect, control, and ...

The Hidden Cost of Secrets Sprawl

Manual secrets management costs organizations $172,000+ annually per 10 developers. Discover the hidden productivity drain, security risks, and how automation can recover at least 1.2 FTE worth of capacity. The post The Hidden Cost of Secrets ...

The Wild West of AI-Driven Fraud

We are in the middle of an AI gold rush. The technology is advancing, democratizing access to everything from automated content creation to algorithmic decision-making. For businesses, this means opportunity. For fraudsters, it means carte ...

The CISO’s Guide to Model Context Protocol (MCP)

As engineering teams race to adopt the Model Context Protocol (MCP) to harness the power of agentic AI, a more cautious conversation dominates security leaders’ mindshare. While the potential for innovation is clear, the primary question ...

How to Implement a Secure BYOD Policy for a Modern Workforce

Bring Your Own Device (BYOD) programs are now a fixture of the modern workplace. Employees expect to use their own phones, tablets, and laptops to get work done, whether at home, in the office, or on the road. For organizations, this flexibility ...

WhatsApp now lets you secure chat backups with passkeys

Messaging service WhatsApp is launching passkey-encrypted chat backups for iOS and Android, allowing users to encrypt their stored message history using their face, fingerprint, or device screen-lock code. Backups have long been a weak link in ...

Threat Actors Weaponizing Open Source AdaptixC2 Tied to Russian Underworld

AdaptixC2, a legitimate and open red team tool used to assess an organization's security, is being repurposed by threat actors for use in their malicious campaigns. Threat researchers with Silent Push have linked the abuse of the technology back ...

Scoping a web application penetration test: What else you need to consider

One of the most important phases of any web application penetration test is scoping. It sets the parameters for the test, defines the methodology, and helps ensure the results are meaningful. A clearly defined scope reduces the chances of missing ...

Upwind unveils AI-powered Exposure Validation Engine to redefine dynamic CSPM

Upwind has launched its Exposure Validation Engine, a capability that introduces dynamic, real-time validation into the Cloud Security Posture Management (CSPM) layer. This innovation enables security, engineering, and compliance teams to ...

Reflectiz Raises $22 Million for Website Security Solution

The company will expand its product offering, establish global headquarters in Boston, and fuel growth and go-to-market efforts. The post Reflectiz Raises $22 Million for Website Security Solution appeared first on SecurityWeek.

How Can Generative AI Transform the Future of Identity and Access Management 

Generative AI is transforming identity and access management by enabling adaptive authentication, real-time threat detection, and smarter cybersecurity. The post How Can Generative AI Transform the Future of Identity and Access Management  ...

Millions Impacted by Conduent Data Breach

The hackers stole names, addresses, dates of birth, Social Security numbers, and health and insurance information. The post Millions Impacted by Conduent Data Breach appeared first on SecurityWeek.

The ROI of Threat-Led Defense: Reducing Waste in the Security Stack

Security gaps are not the only serious issue CISOs must address. Security overlaps can also cause problems of their own. These overlaps are commonly overlooked, yet they increase operating costs, contribute to alert fatigue, and generate false ...

Why Frost & Sullivan named AppOmni a Growth & Innovation Leader in the 2025 Frost Radar™ for SSPM

Frost & Sullivan recognized AppOmni’s leadership in SaaS security innovation, highlighting our AI, Zero Trust, and app-level depth. The post Why Frost & Sullivan named AppOmni a Growth & Innovation Leader in the 2025 Frost Radar™ ...

AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition

Frost & Sullivan honors AppOmni for excellence in SaaS Security Posture Management, recognizing its innovation, scale, and customer impact. The post AppOmni Awarded the 2025 Frost & Sullivan Technology Innovation Leadership Recognition ...

AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security Posture Management, Earns Tech Innovation Leadership Recognition

AppOmni is named Growth & Innovation Leader in 2025 Frost Radar™ for SSPM and awarded with Tech Innovation Recognition by Frost & Sullivan. The post AppOmni Named Growth and Innovation Leader in 2025 Frost Radar™ for SaaS Security ...

Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)

Attackers have been spotted exploiting the recently patched WSUS vulnerability (CVE-2025-59287) to deploy infostealer malware on unpatched Windows servers. An out-of-band update Last week’s release of an emergency fix for CVE-2025-59287, a ...

Major US Telecom Backbone Firm Hacked by Nation-State Actors

Ribbon Communications provides technology for communications networks and its customers include the US government and major telecom firms.  The post Major US Telecom Backbone Firm Hacked by Nation-State Actors appeared first on SecurityWeek.

Aembit Introduces Identity and Access Management for Agentic AI

Silver Spring, USA/ Maryland, 30th October 2025, CyberNewsWire The post Aembit Introduces Identity and Access Management for Agentic AI appeared first on Security Boulevard.