Application Security News and Articles


AttackIQ Ready3 identifies which vulnerabilities are truly exposed

AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform ...

Introducing Comprehensive Workload Identity and Access Management Across Microsoft Environments

5 min readWith Aembit, you can secure Microsoft workloads – wherever they run – using short-lived credentials, posture-aware policies, and no-code credential injection. The post Introducing Comprehensive Workload Identity and Access ...

Silobreaker’s AI widgets automate stakeholder-ready intelligence reporting

Silobreaker released AI Summarise for dashboards and email alerting. This latest enhancement brings the power of customisable AI directly into the core of the analyst workflow – enabling threat intelligence teams to generate stakeholder-ready ...

Zero Networks Raises $55 Million for Microsegmentation Solution

Microsegmentation provider Zero Networks has raised $55 million in a Series C funding round led by Highland Europe. The post Zero Networks Raises $55 Million for Microsegmentation Solution appeared first on SecurityWeek.

5 Practical Moves to Take Control of Cybersecurity Exposure

AttackIQ Ready3 turns recommendations into action with a built-in CTEM workflow that maps attack surfaces, validates exposures, and tracks risk in real time. With MITRE ATT&CK-aligned tests, extended discovery, and automated checks, security ...

MainStreet Bank Data Breach Impacts Customer Payment Cards 

The incident occurred in March and impacted the personally identifiable information of approximately 4.65% of MainStreet Bancshares’ customers. The post MainStreet Bank Data Breach Impacts Customer Payment Cards  appeared first on SecurityWeek.

Posture ≠ Protection

CSPM, DSPM, ASPM, SSPM, ESPM — the alphabet soup of Security Posture Management (SPM) tools promises visibility into risk. They map misconfigurations, surface exposure paths and highlight policy gaps. That can be useful. But let’s not confuse ...

Over 30 Vulnerabilities Patched in Android

The latest Android updates fix vulnerabilities in Runtime, Framework, System, and third-party components of the mobile OS. The post Over 30 Vulnerabilities Patched in Android appeared first on SecurityWeek.

Photos: Infosecurity Europe 2025

Infosecurity Europe 2025 is a cybersecurity event taking place from June 3 to 5 in London. Help Net Security is on-site and here’s a closer look at the conference. The featured vendors are: Okta, PlexTrac, ISC2, Insight, EasyDMARC, ...

Interlock and the Kettering Ransomware Attack: ClickFix’s Persistence

In healthcare, every minute of downtime isn’t just a technical problem — it’s a patient safety risk. CNN recently reported that Kettering Health, a major hospital network in Ohio, was hit by a ransomware attack. According to CNN, the ...

Akamai launches DNS Posture Management for real-time monitoring and guided remediation

Akamai Technologies has introduced Akamai DNS Posture Management, a solution that offers unified, multicloud visibility over all DNS assets. The agentless solution provides real-time monitoring and guided remediation across all major DNS ...

RSA enhances passwordless identity platform

RSA announced a new Identity Security Posture Management (ISPM) and enhancements to its passwordless identity platform. These innovations will help enterprises proactively find and resolve security risks across hybrid and cloud environments and ...

Australia Enforces Ransomware Payment Reporting

Covered organizations in Australia are now required to report ransomware and other cyber extortion payments within three days. The post Australia Enforces Ransomware Payment Reporting appeared first on SecurityWeek.

Implementing Comprehensive SAST Security Scanning in GitLab CI/CD with Jenkins Integration

🔧 Automate SAST DAST in GitLab CI/CD with Jenkins pipelines. Export results to DefectDojo for easy tracking and faster remediation.Continue reading on Medium »

ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the ...

Google Researchers Find New Chrome Zero-Day

Reported by the Google Threat Analysis Group, the vulnerability might have been exploited by commercial spyware. The post Google Researchers Find New Chrome Zero-Day appeared first on SecurityWeek.

Scammers are impersonating Interactive Brokers: Here’s what you need to know

Interactive Brokers is warning customers to be on high alert due to a wave of scams involving fraudsters posing as company representatives. Interactive Brokers (IBKR) is a global brokerage firm that lets investors trade stocks, options, futures, ...

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Microsoft and CrowdStrike are running a project that aims to align threat actor names, and Google and Palo Alto Networks will also contribute. The post Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names appeared first on SecurityWeek.

How global collaboration is hitting cybercriminals where it hurts

In this Help Net Security interview, William Lyne, Deputy Director of UK’s National Crime Agency, discusses the cybercrime ecosystem and the threats it enables. He explains how cybercrime is becoming more accessible and fragmented. Lyne ...

Multiple High-Risk Vulnerabilities in Microsoft Products

According to the latest advisory by Cert-In, 78 vulnerabilities have been discovered across a broad range of Microsoft products, including Windows, Azure, MS Office, Developer Tools, Microsoft Apps, System Center, Dynamics, and even legacy ...