Application Security News and Articles


Veeam Kasten for Kubernetes v8 unifies VM and container data protection

Veeam Software launched Veeam Kasten for Kubernetes v8, designed to bring data resilience to both traditional virtual machines (VMs) and cloud-native environments, delivering security and operational efficiency. Veeam Kasten for Kubernetes v8 ...

Strider Spark protects organizations from state-sponsored threats

Strider announced new capabilities for Spark, the company’s proprietary AI-powered intelligence engine that is transforming how organizations identify and mitigate risks associated with state-sponsored threats. Industry, government, and ...

Critical OpenPGP.js Vulnerability Allows Spoofing

An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification to be spoofed.  The post Critical OpenPGP.js Vulnerability Allows Spoofing appeared first on SecurityWeek.

What good threat intelligence looks like in practice

In this Help Net Security interview, Anuj Goel, CEO of Cyware, discusses how threat intelligence is no longer a nice to have, it’s a core cyber defense requirement. But turning intelligence into action remains a challenge for many ...

AutoPatchBench: Meta’s new way to test AI bug fixing tools

AutoPatchBench is a new benchmark that tests how well AI tools can fix code bugs. It focuses on C and C++ vulnerabilities found through fuzzing. The benchmark includes 136 real bugs and their verified fixes, taken from the ARVO dataset. Patch ...

Third-party cyber risks and what you can do

When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director ...

Nation-state APTs ramp up attacks on Ukraine and the EU

Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive ...

How to get AirSwap (sAST) Rewards and Maximize APY

A Beginner's Guide To Staking $sAST from AirSwapContinue reading on Medium »

Fitting Cybersecurity Investments into Your Budget

How Can You Make Cybersecurity Budget Allocations Effective? How do organizations allocate effective funds to cybersecurity? The million-dollar question remains unanswered for many businesses, irrespective of their sizes. It’s not just a matter ...

Free to Choose the Right Security for Your Cloud

Is Choosing Cloud Security a Complex Task? From financial services and healthcare to DevOps and SOC teams, businesses across sectors are grappling with the complexity of managing Non-Human Identities (NHIs). NHIs, essentially machine identities, ...

Attack Surface Reduction for Enterprises: A Guide

Today’s enterprises have embraced digital evolution. Business deals are conducted in online spaces, contracts are signed with a keyboard, data is held in physical servers and the cloud, and client... The post Attack Surface Reduction for ...

BSidesLV24 – GroundFloor – Windows EventLog Persistence? The Windows Can Help Us

Author/Presenter: Fabricio Gimenes Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Why Your MTTR Is Too Slow — And How to Fix It Fast

SLASH YOUR MTTR! Join Us for a Live Webinar on Faster Incident Response & Reduced Downtime. MTTR (Mean Time to Response) isn’t just a buzzword — it’s a crucial metric that can make or break your organization’s ability to bounce back ...

How to get AirSwap (sAST) Rewards and Maximize APY

A Beginner's Guide To Staking $sAST from AirSwapContinue reading on Medium »

Randall Munroe’s XKCD ‘Renormalization’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Renormalization’ appeared first on Security Boulevard.

The Role of Microsegmentation in Managing Lateral Movement Through Inbound and Outbound Traffic Policies 

Microsegmentation has become a foundational component of enterprise security and a Zero Trust Architecture (ZTA). As threats continue to grow in complexity, the ability to contain and limit the spread of an attack inside the network is critical. ...

The State of AI in Cybersecurity 2025: What’s Working, What’s Lagging, and Why It Matters Now More Than Ever

This second annual study offers a deeper look at how organizations are using AI to detect and respond to attacks faster, where it’s making the biggest impact, and what’s holding adoption back. The post The State of AI in Cybersecurity 2025: ...

Application Security Testing: Security Scanning and Runtime Protection Tools

Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech. The post Application Security Testing: Security Scanning and Runtime Protection Tools appeared first on Security ...

BSidesLV24 – GroundFloor – The B-Side That No One Sees: The Ransomware That Never Reached Mainstream Popularity

Author/Presenter: Cybelle Olivera, Mauro Eldritch Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...

Scripting Outside the Box: API Client Security Risks (2/2)

Continuing on API client security, we cover more sandbox bypasses, this time in Bruno and Hoppscotch, as well as JavaScript sandboxing best practices. The post Scripting Outside the Box: API Client Security Risks (2/2) appeared first on Security ...