Application Security News and Articles


Healthcare security is broken because its systems can’t talk to each other

In this Help Net Security interview, Cameron Kracke, CISO at Prime Therapeutics, discusses how the healthcare ecosystem can achieve cohesive security visibility. With hospitals, clinics, telehealth, and cloud partners all in the mix, maintaining ...

Wanna bet? Scammers are playing the odds better than you are

Placing a bet has never been this easy, and that’s the problem. The convenience of online gambling is the same thing scammers are cashing in on. Whether it’s a fake app, a “can’t-miss” tipster, or a rigged casino, the game is stacked ...

Sprout: Open-source bootloader built for speed and security

Sprout is an open-source bootloader that delivers sub-second boot times and uses a clean, data-driven configuration format that works across operating systems. “We built Sprout because we were frustrated by how fragile and slow traditional ...

Automation can’t fix broken security basics

Most enterprises continue to fall short on basic practices such as patching, access control, and vendor oversight, according to Swimlane’s Cracks in the Foundation: Why Basic Security Still Fails report. Leadership often focuses on broad ...

Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases

Google and Mozilla have released fresh Chrome and Firefox updates that address multiple high-severity security defects. The post Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases appeared first on SecurityWeek.

Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management

Unlocking Cloud Security: Introducing the New AWS Key Rotation Feature in CipherTrust Cloud Key Management madhav Thu, 11/13/2025 - 05:12 How Automated Key Management Empowers Customers and Elevates Data Protection Encryption ...

The browser is eating your security stack

Employees log into SaaS platforms, upload files, use AI tools, and manage customer data from a single tab. While the browser has become the enterprise’s main workspace, it remains largely outside the reach of security controls. According to the ...

News Alert: Gartner ranks ThreatBook a ‘strong performer’ in NDR for the third consecutive year

SINGAPORE, Nov. 13, 2025, CyberNewswire – ThreatBook, a global leader in threat intelligence-based cybersecurity solutions, today announced that for its Threat Detection Platform (TDP), it has been recognized as a Strong Performer in the 2025 ...

ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year

Singapore, Singapore, 13th November 2025, CyberNewsWire The post ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year ...

How Smart NHI Solutions Enhance Security Measures

How Does NHI Management Revolutionize Security Frameworks? Have you ever wondered why securing machine identities is as critical as protecting human identities? Non-Human Identities (NHIs), such as machine or application identities, play an ...

Ensuring Scalability in Your NHI Security Practices

Why Should Non-Human Identities (NHIs) Be Your Next Security Focus? Have you considered how Non-Human Identities (NHIs) fit into your organization’s cybersecurity strategy? Where cloud computing is omnipresent, securing NHIs is not just an ...

Creating Stability in NHI Management Across Multiple Clouds

How Can Organizations Achieve Stability in Managing Non-Human Identities Across Multiple Clouds? Where technology rapidly evolves and security threats become increasingly sophisticated, how can organizations ensure stability when managing ...

Confidently Managing Your NHIs’ Security Posture

Why is Managing Non-Human Identities Crucial for Your Organization’s Security Posture? Digital is continually evolving, and with it comes the increasing reliance on non-human identities (NHIs) to automate and streamline processes across various ...

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. ...

NDSS 2025 – Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr ...

NDSS 2025 – A Holistic Security Analysis Of Google Fuchsia’s (And gVisor’s) Network Stack

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Inon Kaplan (Independent Researcher), Ron Even (Independent Researcher), Amit Klein (The Hebrew University Of Jerusalem, Israel) --- PAPER --- You Can Rand but You Can't ...

Unprecedented Automation: IndonesianFoods Pits Open Source Against Itself

Over the past year, we've seen a steady drumbeat of supply chain incidents targeting npm — each slightly different, but collectively pointing to the same truth: the open source ecosystem is being stress-tested in real time. The post ...

Using AI to Predict and Disrupt Evolving Cyberattacks

Rachel Jin, chief enterprise platform officer at Trend Micro, explains how multiple forms of artificial intelligence (AI) will be used to predict and disrupt cyberattacks even as they grow in volume and sophistication. As cyberattacks grow in ...

Operationalizing Threat Intelligence and AI-Powered Cyber Defense

Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations today struggle to turn ...

Survey Surfaces Sharp Rise in Cybersecurity Incidents Involving AI

A survey of 500 security practitioners and decision-makers across the United States and Europe published today finds cyberattacks aimed at artificial intelligence (AI) applications are rising, with prompt injections involving large language ...