ChannelLife US - Industry insider news for technology resellers

AppSec stories

Flux result 44e11089 0abf 4f3d 9c26 0684b856984e

Appdome launches identity-first mobile API protection

Yesterday
#
virtualisation
#
firewalls
#
endpoint protection
Appdome unveils mobile API defence that checks app, device and session identity before granting access, targeting bot abuse and takeover attacks.
Flux result 7d0a5cbf d950 4e71 8582 c3061c56e0d1

OpenAI broadens AI cyber tools as arms race heats up

Yesterday
#
data protection
#
ransomware
#
application security
OpenAI widens AI cyber tools to verified users as Anthropic keeps rivals guessing, fuelling debate over who gains an edge in the ransomware fight.
Flux result bda8fa3f b9b2 421e 992b 6bbacbd7b7cc

Capsule Security raises $7 million to guard AI agents

2 days ago
#
pam
#
cloud security
#
application security
Capsule Security emerges from stealth with $7 million backing to police AI agents at runtime as enterprises widen their use.
Flux result 3fb02bd1 1848 4544 8c34 d894346384d2

AI coding boom deepens cognitive debt, says Thoughtworks

3 days ago
#
devops
#
digital transformation
#
application security
Thoughtworks warns AI-assisted coding is swelling software complexity, as developers lean on older controls to curb security and oversight risks.
Flux result 51cf6bc6 caf3 4086 9aca 43f89e74737d

Cloudflare, Wiz link AI security tools for unified view

3 days ago
#
firewalls
#
data protection
#
digital transformation
Cloudflare and Wiz team up to map shadow AI risks across cloud estates and protect sensitive data as firms race to secure chatbot deployments.
Flux result be5832d1 2647 4b40 8c3f 54ddb15bfb62

OpenAI expands cyber access for verified defenders

3 days ago
#
application security
#
socs
#
physical security
OpenAI broadens Trusted Access for Cyber to verified defenders, giving vetted users GPT-5.4-Cyber for tougher security work and code analysis.
Flux result 20e12820 27f4 4e8a 9da9 1c2ee2ea902d

Sonatype warns of surge in trusted open-source malware

3 days ago
#
application security
#
devsecops
#
supply chain
Sonatype flags 21,764 malicious open-source packages in Q1 2026, with npm hit hardest as attackers used trusted workflows to steal secrets.
Flux result 74d24583 17eb 4fc8 8dec 9d2e609f0537

Mythos model sparks warnings over AI cyber threats

4 days ago
#
data protection
#
digital transformation
#
mfa
Enterprises urged to overhaul cyber defences as Anthropic's upcoming Mythos model raises fears of faster phishing, deepfakes and automated attacks.
Flux result 69d8aedf 698f 4136 9525 1ed7c7a0ec10

Forrester says Anthropic AI could break patch playbook

4 days ago
#
hybrid cloud
#
digital transformation
#
application security
Forrester warns Anthropic's Project Glasswing could overwhelm vulnerability management, as AI uncovers flaws faster than patching teams can respond.
Flux result 8ebd1272 347f 4407 acbc d4999522fad4

Permiso launches sandbox for AI agent skill security

Last week
#
firewalls
#
network security
#
cloud security
Permiso launches SandyClaw sandbox to detonate AI agent skills and expose hidden runtime risks before they reach enterprise systems.
Flux result 4fd4ec51 3ee5 4138 9d86 cf53ec65c7ba

F5 & Forcepoint come together to secure enterprise AI

This month
#
data protection
#
hybrid cloud
#
digital transformation
F5 and Forcepoint have teamed up to link data discovery with runtime controls, aiming to curb AI risks as enterprises move systems into production.
Flux result 72cac1e8 59d9 4621 a2fe 83cc91404145

Qodo raises $70 million to develop a trust layer for AI coding

Last month
#
data protection
#
devops
#
application security
Qodo secures $70 million Series B as investors back its bid to become the trust layer for AI-generated software.
John maddison  chief marketing officer at f5

F5 & Forcepoint join forces on enterprise AI security

Last month
#
data protection
#
digital transformation
#
application security
F5 and Forcepoint team up to give enterprises continuous AI security, linking data discovery with runtime controls to reduce risk in production systems.
Secure enterprise control room ai agent nodes toolchain anomaly cloud

Miggo expands runtime defence for AI agents & tools

Last month
#
firewalls
#
network security
#
cloud security
Miggo extends its runtime security platform to map, monitor and rein in AI agents and MCP toolchains as live behaviour becomes attack focus.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.
Cybersecurity analyst ai red teaming prompt injection shield branching

Novee launches AI red teaming tool for LLM app risks

Last month
#
devops
#
cloud security
#
application security
Novee unveils an autonomous AI red teaming tool to probe LLM apps for prompt injection, jailbreaks and other emerging security flaws.
Flux result de4342ac 163e 4114 a035 3ed2c0223bc6

BlueFlag lifts Series A after rapid revenue growth

Last month
#
saas
#
devops
#
cloud security
BlueFlag Security secures USD $28 million Series A to scale its identity-first cyber platform tackling AI and developer risks in software.
Software engineer reviewing branching dependency tree upgrade success green

Sonatype finds live data beats larger AI models on upgrades

Last month
#
devops
#
application security
#
supply chain
Sonatype says smaller AI tied to live software data can outsecure larger models on dependency upgrades, slashing risk and cost.
Flux result b75b6c52 41bc 48f4 a421 ca157511836e

NSS Labs backs AI guardrail tests amid security fears

Last month
#
firewalls
#
devops
#
digital transformation
NSS Labs warns many enterprise AI guardrails fail basic security tests, urging independent, real-world validation of protections.
Alison

Cloudsmith adds controls to block risky dependencies

Last month
#
devops
#
cloud security
#
application security
Cloudsmith adds automated controls to quarantine and block risky dependencies, tightening enforcement on software supply chain security.