Application Security News and Articles


Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause. The post Impact, Root Cause of GitHub Actions Supply Chain Hack Revealed appeared first on SecurityWeek.

Report Surfaces Sharp Increase in Cyberattacks Aimed at Applications

An analysis of cyberattacks made against applications published this week by Digital.ai, a provider of a platform for securely delivering software, finds a 20% year over year increase, with 83% of applications tracked in January now under ...

How AI Is Used in Fraud Detection [2025]

Learn how AI fraud detection reduces losses, boosts security, and protects your business with real-time threat prevention. The post How AI Is Used in Fraud Detection [2025] appeared first on Security Boulevard.

The hidden risk in SaaS: Why companies need a digital identity exit strategy

In the face of sudden trade restrictions, sanctions, or policy shifts, relying on SaaS providers outside your region for identity services is a gamble that companies can no longer afford to take. With trade disputes set to escalate, a sudden ...

AI will make ransomware even more dangerous

Ransomware is the top predicted threat for 2025, which is especially concerning given 38% of security professionals say ransomware will become even more dangerous when powered by AI, according to Ivanti. In comparison to the threat level, only ...

Importance of Regular Network Security Audit

A network is simply a way for devices like computers, phones, or servers to connect and communicate with each other. It is similar to a road system that allows cars to travel between different places. If we take the cars as data and the ...

Scammers cash in on tax season

AI-powered phishing emails, deepfake phone calls, and fake tax prep websites are making tax scams more convincing and costly than ever, according to McAfee. Cybercriminals are pulling out all the stops to trick Americans out of their hard-earned ...

New infosec products of the week: March 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Cloudflare, Cytex, Keysight Technologies, and TXOne Networks. Keysight AI Insight Brokers accelerates threat detection and response Keysight ...

What is Role-Based Access Control (RBAC)?

Role-Based Access Control (RBAC) is a security model that assigns permissions based on predefined organizational roles rather than individual users. By linking users to roles, RBAC simplifies access management, enhances security, and ensures ...

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Artificial intelligence (AI) has rapidly shifted from buzz to business necessity over the past year—something Zscaler has seen firsthand while pioneering AI-powered solutions and tracking enterprise AI/ML activity in the world’s largest ...

Imperva Named a Leader in Forrester Wave™: Web Application Firewall (WAF) Solutions: A Continued Legacy of Excellence

In today’s digital-first environment, protecting web applications and APIs is a critical priority for businesses. Organisations seek trusted solutions that balance robust protection, scalability, and ease of use. It’s no surprise that Imperva ...

How do I manage access controls for NHIs within an IAM system?

Navigating Non-Human Identity Access Control in IAM Systems Is your organization struggling to manage Non-Human Identities (NHIs) within an IAM system effectively? NHIs are often overlooked, yet they play a vital role in maintaining system ...

What challenges should I expect when adding NHIs to an IAM framework?

Are NHIs the missing piece in your IAM framework puzzle? Securing an Identity and Access Management (IAM) framework is an essential piece of the cybersecurity puzzle. But have you considered the role that Non-Human Identities (NHIs) play? If not, ...

Guide to the 6 Steps of the Vulnerability Management Lifecycle

The post Guide to the 6 Steps of the Vulnerability Management Lifecycle appeared first on AI Security Automation. The post Guide to the 6 Steps of the Vulnerability Management Lifecycle appeared first on Security Boulevard.

Sextortion scams are on the rise — and they’re getting personal

Scammers are in on the sextortion trend. Our expert analysis on this trend found that the likelihood of being targeted by sextortion scammers in the first few months of 2025 increased by a whopping 137% in the U.S., while the risk jumped to 49% ...

Can’t Miss Keynotes & Tech Talks at KubeCon Europe 2025

I can’t believe that KubeCon + CloudNativeCon Europe 2025 is just around the corner! Once again, I’m excited to meet up with my friends and colleagues again at this event dedicated to cloud native computing. This year the event is in London, ...

Beyond CASB: Strengthening Cloud Security with Deep File Inspection & Data Protection

The post Beyond CASB: Strengthening Cloud Security with Deep File Inspection & Data Protection appeared first on Votiro. The post Beyond CASB: Strengthening Cloud Security with Deep File Inspection & Data Protection appeared first on ...

Frost & Sullivan Report: Independent Security Efficacy Testing of Cato SASE Platform Using SafeBreach

See how independent analyst firm Frost & Sullivan used the SafeBreach exposure validation platform to test the efficacy of the Cato SASE Cloud Platform. The post Frost & Sullivan Report: Independent Security Efficacy Testing of Cato SASE ...

DEF CON 32 – Recon Village – Recursion is a Harsh Mistress: How (Not) To Build a Recursive Internet Scanner

Speaker: TheTechromancer Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Report: More Attacks Aimed at Android Devices Configured with Root Access

A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 times more likely to be ...