Application Security News and Articles


The Hidden Cost of Compliance: When Regulations Weaken Security

The current state of regulation and the overwhelming burden it brings to most enterprises is a discussion worth having The post The Hidden Cost of Compliance: When Regulations Weaken Security appeared first on SecurityWeek.

Agentic AI and software development: Here’s how to get ahead of rising risk

As technology leadership pushes ever harder to deeply embed AI agents into software development lifecycles — in some cases, even using agentic AI to replace midlevel developers — application security (AppSec) is about to go from complex to a ...

Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw

XSS vulnerability allowed a threat actor to redirect users to arbitrary domains. The post Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw appeared first on SecurityWeek.

The 2025 State of Application Risk Report: Understanding Toxic Combinations in Application Security

Get details on the most common toxic combinations Legit unearthed in enterprises' software factories. The post The 2025 State of Application Risk Report: Understanding Toxic Combinations in Application Security appeared first on Security Boulevard.

2024 phishing trends tell us what to expect in 2025

Phishing has been the method most often employed by cybercriminals to achieve initial access to targeted organizations in 2024, according to risk advisory firm Kroll, which expects this trend to continue in 2025. But attackers have also ...

Cisco Patches Vulnerabilities in Nexus Switches

Cisco has patched command injection and DoS vulnerabilities affecting some of its Nexus switches, including a high-severity flaw. The post Cisco Patches Vulnerabilities in Nexus Switches appeared first on SecurityWeek.

eBPF Versus Kernel Extensions

eBPF-based agents have numerous advantages that make them a safer, more efficient option in comparison to agents that use kernel extensions. The post eBPF Versus Kernel Extensions appeared first on Security Boulevard.

How to Detect and Mitigate Application Layer Attacks

Discover how to detect and mitigate application layer attacks, protect web apps, and ensure secure and reliable online experiences. The post How to Detect and Mitigate Application Layer Attacks appeared first on Security Boulevard.

Failure, Rinse, Repeat: Why do Both History and Security Seem Doomed to Repeat Themselves?     

Security-oriented news often stays within the security community, that is until it hits home, or often millions of homes. We’ve most recently heard about breaches at National Public Data and Ticketmaster, but there are names from the past ...

FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge

The FBI has attributed the Bybit hack to a North Korean group named TraderTraitor as more technical details of the attack have come to light. The post FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge appeared first on SecurityWeek.

CalypsoAI Security Leaderboard offers safety ranking of major GenAI models

CalypsoAI launched the CalypsoAI Security Leaderboard, an index of all the major AI models based on their security performance. The CalypsoAI Security Leaderboard ranks all the major models on their ability to withstand advanced security attacks ...

Protecting the Soft Underbelly of Your Organization

Organizations are waking up to the sad truth that their workloads are often a weakly protected, and underappreciated aspect of their IT infrastructure, and this problem is growing worse by the day.   The post Protecting the Soft Underbelly ...

New Partnership between metafinanz and Kovrr: Advanced Solutions for Cyber Risk Quantification in the DACH Region | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post New Partnership between metafinanz and Kovrr: Advanced Solutions for Cyber Risk Quantification in the DACH Region | Kovrr appeared first on ...

Aviatrix delivers multicloud security for Kubernetes

Aviatrix launched Aviatrix Kubernetes Firewall, a new solution designed to tackle the pervasive security and application modernization challenges faced by enterprises operating Kubernetes at scale, particularly those in hybrid and multicloud ...

Managing and Mitigating Risk: A Cybersecurity Approach Using Identity-Based Access Controls and Secrets Management

Centering your strategy around identity to manage and mitigate risk will give you the best possible chance of success. The post Managing and Mitigating Risk: A Cybersecurity Approach Using Identity-Based Access Controls and Secrets Management ...

Vulnerability Management vs. Patch Management: Understanding the Key Differences

Nowadays, understanding the nuances of cybersecurity strategies is more critical than ever. Two essential components in fortifying your organization’s defenses are vulnerability management and patch management. While they may seem ...

What is Skimming in Cybersecurity? How to Detect and Prevent a Skimming Attack

Web skimming is a cyberattack where hackers steal credit card data from e-commerce sites. Learn how it works, its impact, and ways to detect and prevent attacks The post What is Skimming in Cybersecurity? How to Detect and Prevent a Skimming ...

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’ valid session data and gain unauthorized access to the vulnerable application. ...

Trustmi Behavioral AI combats social engineering attacks

Trustmi announced new Behavioral AI, anomaly detection, and risk-scoring capabilities to help enterprise customers combat social engineering attacks on their finance teams, payment systems, suppliers, and processes. The new wave of sophisticated ...

F5 Application Delivery and Security Platform simplifies management for IT and security teams

F5 introduced the F5 Application Delivery and Security Platform, an Application Delivery Controller (ADC) solution that fully converges high-performance load balancing and traffic management with app and API security capabilities into a single ...