Application Security News and Articles


How D-EDGE Cut Bot Traffic by 75% & Reclaimed Platform Performance with DataDome

D-EDGE reduced bot traffic by 75% with DataDome, improving platform performance, data visibility, and control—without slowing down teams or users. The post How D-EDGE Cut Bot Traffic by 75% & Reclaimed Platform Performance with DataDome ...

Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains 

Open source drives modern software—but with innovation comes risk. Learn how Sonatype secures the software supply chain to enable safer, faster delivery. The post Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains  ...

Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily ...

Human Error: Lessons from the 2006 VA Data Breach

In a recent podcast interview with Cybercrime Magazine host, Davie Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems reflect on a 2006 data breach which served as a cybersecurity wake up call ...

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Learn why deterministic security remains essential in an AI-driven world and how GitGuardian combines probability and proof for safe, auditable development. The post Probably Secure: A Look At The Security Concerns Of Deterministic Vs ...

Black Hat USA 2025 – Summary of Vendor Announcements (Part 3)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) appeared first on SecurityWeek.

8 Essential Questions for Your Workforce Identity Verification (IDV) Vendor

Choosing the right identity verification (IDV) partner is one of the most critical security decisions you'll make. As organizations fortify their defenses, it’s clear that verifying the identity of your workforce requires a fundamentally ...

We’re a Major Player in the 2025 IDC MarketScape for CNAPP. Here’s Why That Matters for Your Cloud Security.

“With a strong focus on CNAPP through Tenable Cloud Security and exposure management with Tenable One, Tenable provides visibility and control over hybrid attack surfaces, including on-premises, cloud, and hybrid environments,” according to ...

Air France, KLM Say Hackers Accessed Customer Data

Airlines Air France and KLM have disclosed a data breach stemming from unauthorized access to a third-party platform. The post Air France, KLM Say Hackers Accessed Customer Data appeared first on SecurityWeek.

Software License Non-Compliance Is Expensive

Software license non-compliance can carry steep penalties, and breaking service level agreements (SLAs) can also be costly. The post Software License Non-Compliance Is Expensive appeared first on Azul | Better Java Performance, Superior Java ...

MY TAKE: The GenAI security crisis few can see — but these startups are mapping the gaps

LAS VEGAS — A decade ago, the rise of public cloud brought with it a familiar pattern: runaway innovation on one side, and on the other, a scramble to retrofit security practices not built for the new terrain. Related: GenAI … (more…) The ...

SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls

Akira ransomware affiliates are not leveraging an unknown, zero-day vulnerability in SonicWall Gen 7 firewalls to breach corporate networks, the security vendor shared today. “Instead, there is a significant correlation with threat activity ...

Wait… Did I Just Push My Database?

Accidentally committed a sensitive file with Git? Here’s how to fix it and prevent future mistakes.Continue reading on Stackademic »

Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment

CISA and Microsoft have issued advisories for CVE-2025-53786, a high-severity flaw allowing privilege escalation in cloud environments.  The post Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment appeared first on ...

Securing Online Writing Platforms with Passwordless Authentication

Discover how passwordless authentication secures online academic writing platforms while enhancing user privacy and trust. The post Securing Online Writing Platforms with Passwordless Authentication appeared first on Security Boulevard.

Multiple Ransomware Groups are Using Tool to Kill EDR Defenses: Sophos

Multiple ransomware vendors are using the same EDR killer tool, which not only adds to the trend in developing such payloads to terminate protections for systems but also suggests that competing threat actors are sharing tools and technical ...

New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites

A desync attack method leveraging HTTP/1.1 vulnerabilities impacted many websites and earned researchers more than $200,000 in bug bounties. The post New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites appeared ...

The Overlooked Part of Sales Funnels: How MojoAuth Secures Lemlist Alternative Platforms

MojoAuth adds passwordless security to Lemlist alternative platforms, safeguarding sales funnels and boosting trust, compliance, and deliverability The post The Overlooked Part of Sales Funnels: How MojoAuth Secures Lemlist Alternative Platforms ...

CISA, Coast Guard Hunt Engagement Offer Path to Protect Critical Infrastructure   

Organizations should remember that the proactive hunts conducted by CISA, which has been stripped down and is under assault by the Trump administration, are invaluable. The post CISA, Coast Guard Hunt Engagement Offer Path to Protect Critical ...

Integrating SCA into the CI/CD Pipeline: A Step-by-Step Guide

For modern development teams, the use of open-source components is a double-edged sword. While it accelerates innovation, it also…Continue reading on Medium »