Application Security News and Articles


Vibe Coding: When Everyone’s a Developer, Who Secures the Code?

As AI makes software development accessible to all, security teams face a new challenge: protecting applications built by non-developers at unprecedented speed and scale. The post Vibe Coding: When Everyone’s a Developer, Who Secures the Code? ...

Approov Raises $6.7 Million for Mobile App Security

Approov has raised $6.7 million in Series A funding to advance its mobile application and API security solutions. The post Approov Raises $6.7 Million for Mobile App Security appeared first on SecurityWeek.

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Android’s light August 2025 security update resolves an Adreno GPU vulnerability confirmed as exploited in June. The post Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability appeared first on SecurityWeek.

Microsoft Offers $5 Million at Zero Day Quest Hacking Contest

Research demonstrating high-impact cloud and AI security flaws will be rewarded at Microsoft’s Zero Day Quest competition in spring 2026. The post Microsoft Offers $5 Million at Zero Day Quest Hacking Contest appeared first on SecurityWeek.

SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation

Threat actors might be exploiting a zero-day vulnerability in SonicWall firewalls in a fresh wave of ransomware attacks. The post SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation appeared first on SecurityWeek.

How Can Dynamic Application Security Testing (DAST) Help Your Organization?

Dynamic Application Security Testing (DAST) is a black-box security testing method that analyzes running applications for vulnerabilities by emulating real-world attacks against their exposed interfaces. Instead of analyzing source code, DAST ...

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and ...

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major ...

A Day in the Life of A SOC Operations Manager – Prioritizing High-Risk Incidents to Improve SOC Efficiency

A Day in the Life of A SOC Operations Manager - Prioritizing High-Risk Incidents to Improve SOC Efficiency madhav Tue, 08/05/2025 - 05:14 Imagine the pulse of a Security Operations Center (SOC) where analysts, managers, and leaders navigate a ...

Your employees uploaded over a gig of files to GenAI tools last quarter

In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings confirm that sensitive data is being exposed through GenAI tools, something many security ...

Back to basics webinar: The ecosystem of CIS Security best practices

Generative AI models, multi-cloud strategies, Internet of Things devices, third-party suppliers, and a growing list of regulatory compliance obligations all require the same security response: come together as a community to prioritize the ...

Ransomware groups shift to quadruple extortion to maximize pressure

Threat actors are using a new quadruple extortion tactic in ransomware campaigns, while double extortion remains the most common approach, according to Akamai. Ransomware extortion tactics (Source: Akamai) The emerging trend of quadruple ...

Cybersecurity jobs available right now: August 5, 2025

CW – OT Security Officer SSE | United Kingdom | On-site – View job details As a CW – OT Security Officer, you will lead and prioritise a programme of security audits and assurance to identify vulnerabilities within ...

2025 trends: Automating security questionnaires with open APIs

Chief information security officers (CISOs) are continually tasked with understanding and deploying innovative solutions that reduce risk while increasing operational efficiency. As organizations expand their reliance on digital data and ...

Microsoft’s Failed Strategy – Security as an Afterthought

 Microsoft faces ongoing, systemic cybersecurity failures rooted in blind spots within its very organizational design. These vulnerabilities repeatedly result in serious product blunders and damaging breaches. This has once again become evident ...

Securing Non-Human Identities in Complex Hybrid, Multi-Cloud, and Agentic AI Environments

A Big Data Approach to Managing Identity Risk in Modern Enterprise Environments Modern enterprise environments are more fragmented and dynamic than ever before. Organizations now operate across complex hybrid and multi-cloud infrastructures, ...

SOC Visibility Triad is Now A Quad — SOC Visibility Quad 2025

SOC Visibility Triad is Now A Quad — SOC Visibility Quad 2025 I will be really, really honest with you — I have been totally “writer-blocked” (more “analyst blocked”, really) and I decided to release it anyway today … ...

India’s Markets Regulator Wants to Ease Rules on Related-Party Deals. Here’s What That Means

India’s capital markets regulator, SEBI (the Securities and Exchange Board of India), has proposed a set of changes to its oversight of related-party transactions (RPTs), the often-sensitive financial dealings between companies and their ...

NIST Risk Assessment Template: A Step-by-Step Guide to Effective Risk Management

Key Takeaways The Disconnect Between Cyber Risk and Business Strategy If you’re wondering why risk assessments often feel disconnected from business strategy, you’re not alone. ISACA and PwC have both found that even in well-resourced ...

OWASP LLM Risk #5: Improper Output Handling – FireTail Blog

Aug 04, 2025 - Lina Romero - 2025 is seeing an unprecedented surge of cyber attacks and breaches. AI, in particular, has introduced a whole new set of risks to the landscape and researchers are struggling to keep up. The OWASP Top 10 Risks for ...