Application Security News and Articles


Introducing Panto Security: The Complete Solution for Static and Dynamic Analysis | Panto AI

Customer:  “The Wall of Defense works great for dynamic analysis, but we need Panto to also do static analysis and provide feedback to…Continue reading on Medium »

Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Counter antivirus services such as AVCheck allow cybercriminals to test whether their malware is detected by antivirus products. The post Counter Antivirus Service AVCheck Shut Down by Law Enforcement appeared first on SecurityWeek.

May Recap: New AWS Services and Privileged Permissions 

As May 2025 comes to a close, we’re back with the latest roundup of AWS privileged permission updates and service-level developments reshaping cloud security. Tracking these changes is essential, as newly introduced permissions often grant deep ...

US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles

Elected officials, business executives and other prominent figures in recent weeks received messages from someone impersonating Susie Wiles. The post US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles ...

In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked

Noteworthy stories that might have slipped under the radar: simple PoC code released for Fortinet zero-day, OpenAI O3 disobeys shutdown orders, source code of SilverRAT emerges online. The post In Other News: PoC for Fortinet Bug, AI Model ...

OAuth 2.0 in Practice: Building an OAuth Client

Explore OAuth 2.0 implementation by building your own client. Understand client credentials, access tokens, authorization code flow, and secure integration techniques. The post OAuth 2.0 in Practice: Building an OAuth Client appeared first on ...

Product showcase: Smarter pentest reporting and exposure management with PlexTrac

The threat landscape is evolving faster than ever. Staying ahead means going beyond automated scans and check-the-box assessments. It demands continuous, hands-on testing through a security approach that proactively identifies, prioritizes, and ...

CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, ...

Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how pentesters are using the tool. It mostly succeeds, with some caveats ...

Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of cybersecurity incidents. He discusses how AI can transform SAT into a ...

48% of security pros are falling behind compliance requirements

32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting they feel uncertain about achieving this near ...

Finding Stability in Cloud-Native Security Solutions

How Critical is Stability in Cloud-Native Security? Stability is an essential aspect of a reliable cloud-native security strategy. Do you ever question, how can a company ensure stability? The answer lies with Non-Human Identities (NHIs) and ...

Six Levers That Quietly Change Your Risk and How to Spot Them

Most people think risk only moves when you add controls, but five other hidden forces are quietly reshaping your exposure behind the scenes. This post breaks down the six levers that actually move the math, so you can stop treating risk like a ...

Future-proofing your enterprise: the role of crypto-agile PKI in long-term security

Traditional PKI creates bottlenecks that slow digital transformation due to manual processes and limited integration. As organizations adopt cloud, DevOps, and Zero Trust, scalable and automated certificate management becomes essential. Modern ...

OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

Addressing Our ‘Age of Insecurity’ — in Cyber Too

Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers. The post Addressing Our ‘Age of Insecurity’ — in Cyber Too appeared first on ...

Week in review: NIST proposes new vulnerabilities metric, flaws in NASA’s open source software

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerabilities found in NASA’s open source software Vulnerabilities in open source software developed and used in-house by NASA could be ...

Scalable Strategies for Managing Cloud Machine Identities

Are We Doing Enough to Safeguard Our Machine Identities? Securing human identities and their access permissions has been a focal point for most organizations. But, have we addressed a largely overlooked and equally crucial aspect – the ...

Ensuring Safety in Your Secrets Vaulting Techniques

Is Your Organization Unlocking Optimum Secrets Vaulting Possibilities? A particularly striking component is Non-Human Identities (NHIs). They have become a vital aspect of many businesses’ strategies, especially those that operate. This article ...