Application Security News and Articles


The Importance of Code Signing Best Practices in the Software Development Lifecycle

To ensure a secure software supply chain, the need for robust security measures cannot be overstated. One such measure, which serves as a cornerstone for safeguarding software authenticity and integrity, is code signing. Code signing is a process ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #329 – No Nitty-Gritty

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP

Orion protects against data exfiltration by using AI to compare actual data flows against permitted and expected data flows. The post Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP appeared first on ...

HUMAN Security Applies AI to Combatting Malicious Bots

HUMAN Security this week revealed it is applying artificial intelligence (AI) and data modeling to bot management as part of an effort to provide cybersecurity teams more granular insights into the origins of cyberattacks. The post HUMAN Security ...

Most organizations change policies to reduce CISO liability risk

93% of organizations made policy changes over the preceding 12 months to address concerns about increased personal liability for CISOs, according to Fastly. This includes two in five organizations (41%) increasing CISO participation in strategic ...

Identity Attack Surface Management (IASM): The Convergence of Identity Security Frameworks

As cyber threats evolve, Identity Attack Surface Management (IASM) emerges as a critical approach that unifies existing security frameworks to protect digital identities. Discover how this convergence strengthens your security posture against ...

March Madness Requires Vigilance on Both an Individual and Corporate Level

Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program. The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first ...

GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD

4 min readLong-lived credentials and secrets fueled the attack. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD appeared first on Aembit. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity ...

DEF CON 32 – Recon Village – OWASP Amass: Expanding Data Horizons

Instructor: Jeff Foley Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

What’s Behind Google’s $32 Billion Wiz Acquisition?

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem? The post What’s Behind Google’s $32 Billion Wiz Acquisition? appeared first on SecurityWeek.

Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach

Infosys McCamish System has agreed to pay $17.5 million to settle six class action lawsuits filed over a 2023 data breach. The post Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach appeared first on SecurityWeek.

Kariyer.Net’te DevOps’tan DevSecOps’a Dönüşüm -2-Static Application Security Testing

Siber Güvenlik, günümüzde kurumların dijital varlıklarını ve iş süreçlerini korumak için temel ihtiyaç haline gelmiş kritik bir…Continue reading on Kariyer.net Tech »

Kariyer.Net’te DevOps’tan DevSecOps’a Dönüşüm -2-Static Application Security Testing

Siber Güvenlik, günümüzde kurumların dijital varlıklarını ve iş süreçlerini korumak için temel ihtiyaç haline gelmiş kritik bir…Continue reading on Medium »

Virtual Event Today: Supply Chain & Third-Party Risk Security Summit

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues. The post Virtual Event Today: Supply Chain & Third-Party Risk Security Summit appeared first on SecurityWeek.

Report: The State of Secrets Sprawl 2025

GitGuardian’s State of Secrets Sprawl 2025 report shows no progress in combating secrets sprawl, with 23.8 million secrets leaked on public GitHub repositories in 2024—a 25% year-over-year increase. Despite GitHub Push Protection’s efforts, ...

Vanta strengthens collaboration between security and GRC teams

Vanta announced a series of new features and capabilities to help security and GRC teams seamlessly collaborate across their organization and extended network. These releases—including team-based collaboration and granular user access, an ...

APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)

State-sponsored threat actors and cybercrime groups from North Korea, Iran, Russia, and China have been exploiting a zero-day Windows vulnerability with no fix in sight for the last eight years, researchers with Trend Micro’s Zero Day ...

1Kosmos 1Key secures shared login environments and OT systems

1Kosmos announced 1Kosmos 1Key for shared account login environments. With FIDO-compliant biometric authentication, 1Kosmos 1Key addresses the pressing need for security, accountability, and auditability in settings where multiple users access ...

Elastic expands partnership with Tines to scale security operations

Elastic announced an expanded partnership with an integrated offering that includes Tines Workflow Automation and the Elastic Search AI Platform to simplify security and observability workflow automation. The partnership equips security teams ...

Chinese Hacking Group MirrorFace Targeting Europe

Chinese hacking group MirrorFace has targeted a Central European diplomatic institute with the Anel backdoor and AsyncRAT. The post Chinese Hacking Group MirrorFace Targeting Europe appeared first on SecurityWeek.