Application Security News and Articles
Identity is the connective tissue of today’s enterprise. But with identity comes exposure. Credentials are being stolen, resold, and reused across the cybercriminal underground at a scale that far outpaces traditional defenses. Identity ...
Highlights:
Discover every API and API Gateway across your entire AWS environment.
Achieve a complete, accurate inventory in minutes, not weeks or months.
Deploy instantly with a simple, agentless connection.
Traditionally, securing APIs in AWS ...
Author/Presenter: Oscar Baechler, MA (Author @ Packt Publishing, Professor, Lake Washington Institute of Technology)
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...
Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference. The company has also introduced features aimed at speeding up backup recovery, and has announced the completion of its ...
The speakers at ShowMeCon 2025 explored why policy isn't protection without validation. AI, identity, and threat detection must align to reduce operational risk.
The post The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025 ...
Cloudflare announced Cloudflare Log Explorer to help give businesses instant access to critical security and performance insights across their IT environments. Now, customers can analyze, investigate, and monitor for security attacks with log ...
Bitdefender announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended ...
Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a ...
Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.
The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek.
Sensitive data and secrets are leaking. How cloud security leaders can shut them down.
Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials ...
Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog.
The post Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation appeared first on ...
Third-party risk management TPRM is a well-established pillar of enterprise security programs. Its focus is on evaluating vendors for financial health, operational resilience, and compliance. As digital ecosystems expanded, so did the attack ...
Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root access on most Linux distributions “with minimal effort.” About the ...
Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s premium solution leverages a patented Jumio technology, combining randomized color ...
Adopting a layered defense strategy that includes human-centric tools and updating security components.
The post Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security appeared first on SecurityWeek.
OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.
The post OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract appeared first on SecurityWeek.
[New York, US, 06/18/25] AdaCore, which provides software development tools for mission-critical systems, and embedded software security company CodeSecure, today announced a definitive merger agreement. The merger creates a unified company ...
Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components.
The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek.
Now is the time for IT leaders to enforce AI security policies and ensure that generative AI is leveraged safely and responsibly.
The post The Hidden Dangers of AI Copilots and How to Strengthen Security and Compliance appeared first on ...
To level the playing field, enterprise security teams must begin to use AI — especially AI agents — to augment their existing human talent.
The post Why AI Agents are the Secret to a Proactive Cybersecurity Defense appeared first on ...