Application Security News and Articles


The Last Mile of Zero Trust: Securing Where Work Really Happens — The Browser

The Last Mile of Zero Trust: Securing Where Work Really Happens — The Browser At RSAC this year, Andy Ellis, former CSO at Akamai and now Partner at YL Ventures, challenged us to rethink what Zero Trust really means. Not the buzzword. Not ...

Outpost24 simplifies threat analysis with AI-enhanced summaries

Outpost24 announced the addition of AI-enhanced summaries to the Digital Risk Protection (DRP) modules within its External Attack Surface Management (EASM) platform. With Outpost24’s DRP modules, organizations are able to identify, monitor, and ...

Trojanized KeePass opens doors for ransomware attackers

A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data ...

CloudSEK Raises $19 Million for Threat Intelligence Platform

Threat protection and intelligence firm CloudSEK raises $19 million in funding from new and existing investors. The post CloudSEK Raises $19 Million for Threat Intelligence Platform appeared first on SecurityWeek.

O2 Service Vulnerability Exposed User Location

A vulnerability in O2’s implementation of the IMS standard resulted in user location data being exposed in network responses. The post O2 Service Vulnerability Exposed User Location appeared first on SecurityWeek.

Madhu Gottumukkala Officially Announced as CISA Deputy Director

New CISA Deputy Director Madhu Gottumukkala has joined the agency from South Dakota’s Bureau of Information and Technology. The post Madhu Gottumukkala Officially Announced as CISA Deputy Director appeared first on SecurityWeek.

The Windows Subsystem for Linux goes open source

Microsoft has officially open-sourced the Windows Subsystem for Linux (WSL), closing the very first issue ever filed on the Microsoft/WSL GitHub repository: “Will this be open source?” WSL allows developers to run unmodified Linux ...

Ransomware Simulation Playbook- Build Real-World Cyber Resilience Without Paying the Price

It started like any other Monday morning. Coffee cups steamed beside keyboards, servers hummed gently in climate-controlled rooms, and email inboxes pinged with weekend catch-up. But within minutes, that ordinary... The post Ransomware Simulation ...

Absolute Extreme Resilience accelerates recovery following cyberattacks and IT incidents

Absolute Security announced new Extreme Resilience capabilities available in Rehydrate, an Absolute Resilience Platform module. Rehydrate enables remote restoration of Windows endpoints at enterprise scale with a single click. It delivers full ...

What is Penetration Testing as a Service (PTaaS)?

As technology progresses, businesses face an ever-growing number of cyber threats, making robust security measures a top priority. Penetration Testing as a Service provides a cutting-edge solution to identify and mitigate vulnerabilities before ...

CampusGuard ScriptSafe prevents unauthorized script execution

CampusGuard introduced ScriptSafe, a software data security and privacy compliance solution.  ScriptSafe identifies and mitigates risks posed by JavaScript, third-party vendors and open-source code within your web ecosystem. Beyond securing ...

Commvault enhances cyber resilience for Red Hat OpenShift Virtualization workloads

Commvault is extending its Kubernetes protection to support virtual machines (VMs) running on Red Hat OpenShift Virtualization. This new capability enhances cyber resilience for organizations moving to modern application environments. ...

What a Binance CAPTCHA solver tells us about today’s bot threats

In this post, we analyze an open-source CAPTCHA solver designed to bypass a custom challenge deployed on Binance, one of the most popular crypto platforms. While the solver is publicly available, we’ve intentionally chosen not to link to the ...

Closing security gaps in multi-cloud and SaaS environments

In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research on the state of cloud and SaaS security. He talks about how siloed visibility, fragmented tools, and a lack ...

Containers are just processes: The illusion of namespace security

In the early days of commercial open source, major vendors cast doubt on its security, claiming transparency was a flaw. In fact, that openness fueled strong communities and faster security improvements, making OSS often more secure than ...

Why legal must lead on AI governance before it’s too late

In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the legal responsibilities in AI governance, highlighting how cross-functional collaboration enables safe, ethical AI use while ...

Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud

Your Data, Your Responsibility: Securing Your Organization's Future in the Cloud madhav Tue, 05/20/2025 - 04:37 Cloud adoption has fundamentally changed the way businesses operate, offering scalability, agility, and cost efficiencies that ...

AI voice hijacking: How well can you trust your ears?

How sure are you that you can recognize an AI-cloned voice? If you think you’re completely certain, you might be wrong. Why it’s a growing threat With only three seconds of audio, criminals can now clone a person’s voice, which can ...

Cybersecurity jobs available right now: May 20, 2025

The post Cybersecurity jobs available right now: May 20, 2025 appeared first on Help Net Security.

The role of governance in modern secrets management

Without strong governance, secrets management becomes chaotic, increasing security risks and compliance violations. Read how access control, auditability, and automated policies help organizations enforce best practices at scale. The post The ...