Application Security News and Articles


Outpost24 launches Credential Checker to spot leaked credentials on the dark web

Outpost24 has launched the Outpost24 Credential Checker, a free tool that provides organizations with a sneak peek into exposed credentials leaked on the dark web. Timely visibility into credential exposure can mean the difference between a ...

Debunking API Security Myths

I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most common API security myths. From zombie endpoints to the limits of WAFS and gateways, we covered what’s really ...

Cheating on Quantum Computing Benchmarks

Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the ...

Report Links Chinese Companies to Tools Used by State-Sponsored Hackers

SentinelLabs connects the dots between prolific Chinese state-sponsored hackers and companies developing intrusion tools. The post Report Links Chinese Companies to Tools Used by State-Sponsored Hackers appeared first on SecurityWeek.

EU Cyber Resilience Act: What You Must Do Before 2027

The European Union isn’t asking nicely anymore. With the Cyber Resilience Act, they’re laying down the law, literally, for how every company that makes or sells digital products in the... The post EU Cyber Resilience Act: What You Must Do ...

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes

Honeywell has patched several critical and high-severity vulnerabilities in its Experion PKS  industrial process control and automation product. The post Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes appeared first on ...

Google Project Zero Tackles Upstream Patch Gap With New Policy

Google Project Zero now publicly shares the discovery of a vulnerability and when its 90-day disclosure deadline expires. The post Google Project Zero Tackles Upstream Patch Gap With New Policy appeared first on SecurityWeek.

Smarter Protection, Faster Response: Discover What’s New in Our Cyberfraud Protection Platform

Explore the latest updates to DataDome’s Cyberfraud Protection Platform including sampled protection, real-time bot exposure insights, and flexible new response controls to deploy faster and stop threats sooner. The post Smarter Protection, ...

The Unbeatable Duo of EDR and Microsegmentation for Threat Containment

“If a breach happened today, how ready are you to contain it? How would you stop the spread? Can your business keep running while you respond?” Here’s the reality. So, we started helping enterprises move beyond just detecting an attack. ...

Singulr introduces AI control plane to replace fragmented tools with unified, automated governance

Singulr AI launched the unified AI control plane, a platform that empowers IT, security, and compliance leaders to scale AI adoption without compromising trust. Underpinning the platform are three key modules: the Singulr Pulse risk intelligence ...

Citrix delivers new tools for quantum-ready, anywhere work

Citrix has released two new offerings to help enterprises provide secure application access for their entire workforce amid an evolving threat landscape. The first is its post-quantum cryptography (PQC) solution for NetScaler which addresses the ...

Why stolen credentials remain cybercriminals’ tool of choice

It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It was made ...

Palo Alto Networks to acquire CyberArk in $25 billion deal

Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 ...

New AI model offers faster, greener way for vulnerability detection

A team of researchers has developed a new AI model, called White-Basilisk, that detects software vulnerabilities more efficiently than much larger systems. The model’s release comes at a time when developers and security teams face mounting ...

AI is changing the vCISO game

Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and ...

Secrets are leaking everywhere, and bots are to blame

Secrets like API keys, tokens, and credentials are scattered across messaging apps, spreadsheets, CI/CD logs, and even support tickets. According to Entro Security’s NHI & Secrets Risk Report H1 2025, non-human identities (NHIs), including ...

Why rural hospitals are losing the cybersecurity battle

Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. ...

Justified Investments in IAM Tools

Are IAM Tools a Worthy Investment for Your Business? With businesses digitize their operations, they often grapple with the question: are IAM (Identity Access Management) tools a necessary investment for effective cybersecurity? A calculated look ...

Budget-Friendly Secrets Management Solutions

Are you seeking a budget-friendly secrets management solution? The proper management of Non-Human Identities (NHIs) and associated secrets is not only critical but can also be cost-effective. Understanding Non-Human Identities and Secrets NHIs ...

Improving Cyber Defense with NHIs

Is Your Cyber Defense Strategy Fully Optimized? Consider this: are you leveraging every resource to shore up your cyber defense? The challenge lies not only in the sophistication of cyber threats but also in the oblique corners of our systems, ...