Application Security News and Articles


Anviz unveils biometric access control solution

Anviz launched W2 Face, its latest hybrid biometric access control and attendance terminal. Designed to meet the needs of modern enterprises, the W2 Face combines facial recognition, fingerprint authentication, and RFID capabilities in a compact, ...

AI and automation shift the cybersecurity balance toward attackers

Threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders, according to Fortinet. The post AI and automation shift the cybersecurity balance toward ...

Phone theft is turning into a serious cybersecurity risk

Phone theft is a rising issue worldwide, and it’s more than just a property crime. It’s a serious cybersecurity threat. In the UK alone, the Metropolitan Police recovers 1,000 phones each week. Stolen phones don’t just go to local black ...

People know password reuse is risky but keep doing it anyway

35% of Gen Z said they never or rarely update passwords after a data breach affecting one of their accounts, according to Bitwarden. Only 10% reported always updating compromised passwords. 38% of Gen Z and 31% of Millennials only change a single ...

Half of red flags in third-party deals never reach compliance teams

Third-party risk management (TPRM) is compromised in many organizations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. The post Half ...

Infosec products of the month: April 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Abnormal AI, AppViewX, Arctic Wolf Networks, Bitdefender, BitSight, Bugcrowd, Cato Networks, CyberQP, Cyware, Entrust, Exabeam, Flashpoint, ...

PsyOps of Phishing: A Wolf in Shepherd’s Clothing

I am sure all of us have encountered CAPTCHA while browsing the internet. “Verify you are human”, “I’m not a robot”, “Select all the squares with traffic lights” — it has become a recognized if not begrudging part of our regular ...

Tonic.ai product updates: May 2025

Tonic.ai acquires Fabricate, Tonic Textual adds Audio Synthesis, + Okta SSO arrives on Structural Cloud and Textual Cloud! The post Tonic.ai product updates: May 2025 appeared first on Security Boulevard.

Driving Innovation Through Secure NHIs

Why Is Secure NHI Management Crucial for Innovation? What if your organization could unlock the full potential of its cloud environment, ensuring robust security while also spurring on relentless innovation? That’s exactly what effective ...

Feel Empowered by Enhanced NHI Management

Can NHI Management Empower Your Cybersecurity Strategy? One concept is repeatedly surfacing as a strategic necessity – Non-Human Identities (NHIs) management. NHI management is a robust methodology designed to secure machine identities, ...

Is Your Data Truly Protected with Current NHIs?

Are Traditional Security Measures Enough for Data Protection? Most organizations have stringent security measures in place, but the question remains: are these enough to deliver robust data protection? The scope of security threats is also ...

Application-Layer Visibility and Security | Contrast ADR vs Traditional Tools | Contrast Security

Imagine you're a lifeguard at a beach, but you're only allowed to watch from a helicopter or from a camera mounted on the boardwalk. Sure, you’ll see some splashing — maybe even a shark fin or two — but if something happens beneath the ...

BSidesLV24 – Ground Truth – AI In The Human Loop: GenAI In Security Service Delivery

Author/Presenter: Preeti Ravindra Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

The organizational structure of ransomware threat actor groups is evolving before our eyes

The Ransomware-as-a-service (RaaS) model has not recovered from law enforcement disruption, and the entrance of novice actors along with non-Russian state-linked cybercriminals has led to uncertain outcomes for victims. The post The ...

Kubernetes Resource Optimization & Best Practices with Goldilocks

Kubernetes is now the industry standard for orchestrating containerized workloads, but efficient resource management remains a challenge for many organizations. It’s important to get right though! Over-provisioning leads to wasted cloud spend, ...

The Rise of AI-Driven Cyberattacks: Accelerated Threats Demand Predictive and Real-Time Defenses 

Artificial intelligence (AI) is transforming industries, but it’s also empowering cybercriminals to launch sophisticated, high-speed cyberattacks. AI-driven attacks, particularly those orchestrated by autonomous AI agents, operate at an ...

Vulnerability Management: A Race Against Time & Complexity

The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation. The post Vulnerability Management: A Race Against Time & Complexity appeared first on Security Boulevard.

Report Exposes Soft Security Underbelly of Mobile Computing

Zimperium, this week during the 2025 RSA Conference, shared an analysis of mobile computing environments that finds more than 60% of iOS and 34% of Android apps lack basic code protection, with nearly 60% of iOS and 43% of Android apps also ...

BSidesLV24 – Ground Truth – I Won’t Allow My Child To Have A Smartphone: Why Smart Parents Make Not So Smart Children

Authors/Presenters: Arun Vishwanath Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Mobile and third-party risk: How legacy testing leaves you exposed

Risks to software supply chains from mobile applications are increasing, largely due to a lack of deeper visibility into their codebase, a new study has found.  The post Mobile and third-party risk: How legacy testing leaves you exposed appeared ...