Application Security News and Articles


Ransomware and USB attacks are hammering OT systems

Ransomware, trojans, and malware delivered through USB devices are putting growing pressure on industrial systems, according to the Honeywell 2025 Cyber Threat Report, which draws on data from monitoring tools deployed across industrial sites ...

CIAM Across Industries: A Journey Through Digital Identity Neighborhoods

The rapid pace of technological change, evolving regulations, and shifting customer expectations require CIAM systems that can adapt and evolve over time. The organizations that build sustainable competitive advantages through CIAM are those that ...

AI becomes key player in enterprise ransomware defense

Ransomware breaches continue to rise even as fewer victims pay, according to a Delinea report. 69% of organizations globally have fallen victim to ransomware, with 27% being hit more than once. While only 57% of organizations paid ransoms, down ...

New infosec products of the week: June 6, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Akamai, AttackIQ, Barracuda Networks, Bitdefender, Fortinet, Malwarebytes, and Varonis. Bitdefender unifies security, risk management, and compliance in ...

Vendor Risk in SaaS Supply Chains: 2025 Guide | Nudge Security

Why effective vendor risk management is a critical strategy for identifying, assessing, and mitigating risks within the SaaS supply chain. The post Vendor Risk in SaaS Supply Chains: 2025 Guide | Nudge Security appeared first on Security Boulevard.

Skybox Is Gone. The Risk of Waiting Isn’t.

Skybox Is Gone. The Risk of Waiting Isn’t. Skybox is gone, but your compliance deadlines, audit obligations, and security risks are very much alive. Here’s why EMEA organisations must act... The post Skybox Is Gone. The Risk of Waiting ...

Budget-Friendly Secrets Management Options

Are Budget-Friendly Secrets Management Options a Reality? Strategic management of non-human identities (NHIs) and their secrets is a key factor in maintaining robust security and compliance protocols. It’s even more critical when it comes to ...

Building Trust in Non-Human Identity Management

Why is Trust Building Essential in Non-Human Identity Management? What if we told you that the key to securing your digital ecosystem lies in the effective management of Non-Human Identities (NHIs) and their secrets? Yes, you heard it right! In ...

Feeling Relieved with Effective Secrets Rotation?

Understanding the Importance of Secrets Rotation Have you ever stopped to consider how crucial secrets rotation is in maintaining your organization’s cybersecurity? This complex yet rewarding procedure involves the regular updating and changing ...

Optimizing Security with Proactive NHIDR

Why is NHIDR Essential for Proactive Security? If you’ve ever wondered why data breaches continue to plague even the most tech-savvy organizations, you’re not alone. It can be baffling, especially when these companies employ seemingly ...

Zscaler Tightens AI Security With New Tools

LAS VEGAS — Zscaler Inc. on Tuesday announced advanced artificial intelligence (AI) security capabilities to tackle the complexities in deploying advanced AI tools in large, distributed environments at its developers conference here. The new ...

Barracuda Networks Leverages AI to Integrate Cybersecurity Workflows

Barracuda Networks this week added a dashboard that leverages multiple artificial intelligence (AI) technologies to unify the management of its cybersecurity tools and services at no additional cost. Brian Downey, vice president of product ...

5 Takeaways from the “Detect Bad Intent Early” Webinar: How to Stop Fraud Before It Starts

Learn how leading security teams are shifting fraud detection upstream, using intent-based signals and AI-driven defenses to stop fraud before it ever reaches checkout. The post 5 Takeaways from the “Detect Bad Intent Early” Webinar: How to ...

Turn Compliance Into a Competitive Advantage

The post Turn Compliance Into a Competitive Advantage appeared first on Votiro. The post Turn Compliance Into a Competitive Advantage appeared first on Security Boulevard.

Misconfigured HMIs Expose US Water Systems to Anyone with a Browser

Censys researchers follow some clues and find hundreds of control-room dashboards for US water utilities on the public internet. The post Misconfigured HMIs Expose US Water Systems to Anyone with a Browser appeared first on SecurityWeek.

K8s Infrastructure Design Assessment: Optimize Cloud-Native Foundation

A Kubernetes Infrastructure Design Assessment is an important step for organizations seeking to ensure reliable, cost effective, and secure infrastructure. At Fairwinds, a K8s infrastructure design assessment is led by top-level engineers to ...

OffensiveCon25 – Attacking Browsers via WebGPU

Author/Presenter: Lukas Bernhard Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Akamai Extends Cybersecurity Reach to DNS Posture Management

Akamai this week launched an agentless posture management offering that provides visibility across multiple domain name servers (DNS) platforms. Sean Lyons, senior vice president and general manager for infrastructure security solutions and ...

Why Most Exposed Secrets Never Get Fixed

Our latest State of Secrets Sprawl 2025 research reveals a troubling reality: the majority of leaked corporate secrets found in public code repositories continue to provide access to systems for years after their discovery. The post Why Most ...

Yet Another Exposed Database, This Time with 184 Million Records

I had hoped by now we’d be long past the discovery of exposed or misconfigured databases, considering how dangerous they can be to businesses, governments and individuals—and given the heightened security measures that most organizations have ...