Application Security News and Articles


Former Google Cloud CISO Phil Venables Joins Ballistic Ventures

Venables has served as CISO and security executive across several large organizations, including Google Cloud, Goldman Sachs, Deutsche Bank. The post Former Google Cloud CISO Phil Venables Joins Ballistic Ventures appeared first on SecurityWeek.

Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification

Discover how proper secure coding practices can prevent costly data breaches and vulnerabilities. This comprehensive guide covers essential security principles, OWASP Top 10 mitigations, and language-specific techniques that every developer needs ...

DataDome Successfully Renews Its SOC 2 Type 2 Compliance

DataDome renews its SOC 2 Type 2 compliance for the 4th year, covering all core products, with zero exceptions noted and expanded audit visibility into 2025. The post DataDome Successfully Renews Its SOC 2 Type 2 Compliance appeared first on ...

Lattica Emerges From Stealth With FHE Platform for AI

Lattica has raised $3.25 million in pre-seed funding for a platform that uses FHE to enable AI models to process encrypted data.  The post Lattica Emerges From Stealth With FHE Platform for AI appeared first on SecurityWeek.

M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat

Mandiant’s latest threat report shows how attackers adapt faster than defenses, shifting strategies toward credential theft and insider threats. The post M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat appeared first on ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long. What's the logical outcome? ...

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise. The post Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat ...

Build smarter with AI and your software supply chain

AI adoption is reshaping how software gets built. From coding assistants to full-fledged agentic AI applications, developers now routinely rely on artificial intelligence in their workflows. But a subtler shift is also underway: the rise of open ...

Scamnetic Raises $13 Million to Prevent Scams in Real Time

AI-powered threat protection startup Scamnetic has raised $13 million in a Series A funding round led by Roo Capital. The post Scamnetic Raises $13 Million to Prevent Scams in Real Time appeared first on SecurityWeek.

Manifest Raises $15 Million for SBOM Management Platform

Software and AI supply chain transparency firm Manifest has raised $15 million in a Series A funding round led by Ensemble VC. The post Manifest Raises $15 Million for SBOM Management Platform appeared first on SecurityWeek.

In Other News: Prison for Disney Hacker, MITRE ATT&CK v17, Massive DDoS Botnet

Noteworthy stories that might have slipped under the radar: former Disney employee sent to prison for hacking, MITRE releases ATT&CK v17, DDoS botnet powered by 1.3 million devices. The post In Other News: Prison for Disney Hacker, MITRE ...

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days

Multiple South Korean organizations across industries have been targeted in a recent Lazarus campaign dubbed Operation SyncHole. The post South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days appeared first on SecurityWeek.

It’s Time to Prioritize Cybersecurity Education  

From ransomware attacks disrupting school systems to phishing scams targeting student credentials, educational institutions are prime targets for cybercriminals. Cybersecurity education is critical to protecting individual students and the vast, ...

RSA Conference 2025 – Pre-Event Announcements Summary (Part 2) 

Hundreds of companies are showcasing their products and services next week at the 2025 edition of the RSA Conference in San Francisco. The post RSA Conference 2025 – Pre-Event Announcements Summary (Part 2)  appeared first on SecurityWeek.

Who’s to Blame for Bybit?

If a company as big as Bybit can lose over a billion, it points to a much deeper issue and that should alarm anyone in crypto. The post Who’s to Blame for Bybit? appeared first on Security Boulevard.

SAP Zero-Day Possibly Exploited by Initial Access Broker

A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications. The post SAP Zero-Day Possibly Exploited by Initial Access Broker appeared first on SecurityWeek.

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others). Two of the flaws – CVE-2025-25184 and CVE-2025-27111 – could ...

All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack

A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs. The post All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack appeared first on ...

How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape

Discover how implementing Escape x Wiz integration helped the DoubleVerify AppSec team achieve full API visibility and accelerate targeted remediation. The post How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape ...

5 Reasons Organization Should Opt for Web App Pentest

The world that feeds us is digital, and web applications are the backbone of many organizations. Be it e-commerce, healthcare, BFSI, or any other industry, web apps store and process sensitive data on a daily basis. As the saying goes, ‘With ...