Application Security News and Articles


Encryption Backdoors: The Security Practitioners’ View

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared ...

Cloud Privilege Is a Mess. Legacy PAM Can’t Fix It.

For years, organizations have tried to retrofit Privileged Access Management (PAM) tools into the public cloud. Jump boxes. Vaults. Session recording. Manual provisioning. None of it scales and it doesn’t scratch the surface of the cloud ...

Krispy Kreme Confirms Data Breach After Ransomware Attack

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024. The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek.

Choosing a Clear Direction in the Face of Growing Cybersecurity Demands

In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is. The post Choosing a Clear Direction in the Face of Growing Cybersecurity ...

Spamhaus’ take on Cold Emailing…AKA spam

Cold emailing, as it’s practiced today, is spam — for inboxes, businesses, and the internet. It’s a thriving industry, but one raising concerns in the email community. In this article we define cold emailing from our perspective, share ...

How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance

The U.S. Department of Health and Human Services (HHS) is rolling out new HIPAA regulations in 2025. It’s designed to strengthen patient privacy and security in the face of these changes. These HIPAA updates are a response to the rise of ...

The benefits of automating certificate management for the 47-day lifecycle

TLS certificate lifecycles are shrinking again and fast. By 2029, the CA/B Forum will require certificates to expire every 47 days. Manual management isn’t sustainable at that pace. Enterprises must adopt automated certificate lifecycle ...

Five Uncomfortable Truths About LLMs in Production

Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it run. At Wallarm, our experience has proved otherwise. Through rigorous testing and iteration, our engineering team uncovered ...

High-Severity Vulnerabilities Patched by Cisco, Atlassian

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies. The post High-Severity Vulnerabilities Patched by Cisco, Atlassian appeared first on SecurityWeek.

Swedish Truck Giant Scania Investigating Hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited. The post Swedish Truck Giant Scania Investigating Hack appeared first on SecurityWeek.

Why AI code assistants need a security reality check

In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants are transforming development workflows and impacting security. He explains how these tools can boost ...

AI Security Guide: Protecting models, data, and systems from emerging threats

What is AI Security? AI security is where traditional cybersecurity meets the chaotic brilliance of machine learning. It’s the discipline focused on protecting AI systems—not just the code, but the training data, model logic, and ...

SCIM vs SAML: Understanding the Difference Between Provisioning and Authentication

Zero-trust security models are also changing how we think about identity management. The traditional approach of "authenticate once, access everything" is giving way to "authenticate constantly, verify everything." This doesn't change the basic ...

GPS tracker detection made easy with off-the-shelf hardware

Cyberstalkers are increasingly turning to cheap GPS trackers to secretly monitor people in real time. These devices, which often cost less than $30 and run on 4G LTE networks, are small, easy to hide under a bumper or in a glovebox, and can go ...

Sonatype expands global innovation with new India engineering center

At Sonatype, innovation knows no borders. We're excited to announce the opening of our new engineering hub in Hyderabad, India — a strategic milestone in our commitment to scale global innovation  and deliver continuous value to our customers ...

Thieves don’t need your car keys, just a wireless signal

A recent study by researchers at the University of Padova reveals that despite the rise in car thefts involving Remote Keyless Entry (RKE) systems, the auto industry has made little progress in strengthening security. Since RKE’s introduction ...

Secure your data throughout its lifecycle with End-to-End Data Protection

Secure your data throughout its lifecycle with End-to-End Data Protection madhav Thu, 06/19/2025 - 04:53 To most of us, perhaps unknowingly, data is everything. Whether it is a groundbreaking idea, sensitive health records, or confidential ...

91% noise: A look at what’s wrong with traditional SAST tools

Traditional static application security testing (SAST) tools are falling short. That’s the key takeaway from a recent report that tested these tools against nearly 3,000 open-source code repositories. The results: more than 91% of flagged ...

How C-suite roles are shaping the future of tech leadership

As companies accelerate towards technology-driven business models, the tech C-suite is embracing new skills, greater influence, and a unified approach to business transformation, according to Deloitte. Top priorities for tech leaders (Source: ...

News alert: Halo Security’s attack surface management platform wins MSP Today’s top award

Miami, June 18, 2025, CyberNewswire — Halo Security today announced that its attack surface management solution has been named a 2025 MSP Today Product of the Year Award winner by TMC, a leading global media company recognized for building ...