Application Security News and Articles


How Much Does PCI DSS Compliance Cost in 2025?

Why Are PCI Costs Rising in 2025? Recent trends indicate that achieving and maintaining PCI DSS compliance has grown notably more expensive. Several factors contribute to this rise: 1. Inflation and General Rising Costs Like many sectors, the ...

PSA: What Microsoft’s New DMARC Policy Means for High-Volume Senders

Microsoft has recently announced a key update to its DMARC (Domain-based Message Authentication, Reporting & Conformance) policy for high-volume senders. This policy, which is already being enforced as of May 5, 2025—three days ago at the ...

Abuse takes its “toll” on .top: But who is paying the price?

Despite ICANN issuing a formal notice to .top citing a breach of contract for failing to address DNS abuse, the situation has not improved. Over the last six months, abuse of .top hasn’t just persisted, it’s gotten 50% worse! So, why is this ...

Cisco Patches 35 Vulnerabilities Across Several Products

Cisco releases patches for 26 vulnerabilities in IOS and IOS XE software, including 17 critical- and high-severity bugs. The post Cisco Patches 35 Vulnerabilities Across Several Products appeared first on SecurityWeek.

Dozens of SysAid Instances Vulnerable to Remote Hacking

SysAid patches IT service management software vulnerabilities that can be chained for unauthenticated remote command execution.  The post Dozens of SysAid Instances Vulnerable to Remote Hacking appeared first on SecurityWeek.

How Escape Enabled Deeper Business Logic Testing for Arkose Labs

Arkose Labs is a global cybersecurity company that specializes in account security, including bot management, device ID, anti-phishing and email intelligence. Its unified platform helps the world’s biggest enterprises across industries, ...

Protect Yourself From Cyber’s Costliest Threat: Social Engineering

Today, it is safe to say that social engineering has become the most dangerous and costly form of cybercrime that businesses face.   The post Protect Yourself From Cyber’s Costliest Threat: Social Engineering appeared first on Security Boulevard.

Cisco’s new chip wants to scale quantum computing faster

Cisco is making significant strides in quantum computing by focusing on quantum networking, aiming to bring practical applications closer to reality. The company recently introduced a prototype of its Quantum Network Entanglement Chip and ...

The Most Pressing Security Threat to Business is Hidden in Plain Sight

Ultimately, investing in security isn't just about the digital world. For organizations to be successful, they need to take a fundamentally holistic approach to protecting what matters most - people, company data and IP.  The post The Most ...

From certificate chaos to scalable simplicity: Why partners are rethinking how they sell and manage SSL

Managing SSL certificates used to be tedious and manual, but not anymore. With Sectigo’s Certificate as a Service (CaaS), partners can shift from per-cert chaos to scalable, subscription-based simplicity. Automate renewals, support OV certs, ...

ServiceNow unveils AI agents to accelerate enterprise self-defense

ServiceNow launched a new, agentic chapter in enterprise security and risk, introducing AI agents to power the rise of self-defending enterprises. The new agents, available within ServiceNow’s Security and Risk solutions, are designed to ...

Masimo Manufacturing Facilities Hit by Cyberattack

Health technology and consumer electronics firm Masimo detected unauthorized activity on its network in late April. The post Masimo Manufacturing Facilities Hit by Cyberattack appeared first on SecurityWeek.

ProcessUnity Evidence Evaluator flags discrepancies in a third-party’s controls

ProcessUnity introduced Evidence Evaluator, an generative AI that reduces the manual lift of assessing and validating third-party security controls. A key component of ProcessUnity’s Third-Party Risk Management (TPRM) Platform, Evidence ...

It’s a Mad, Mad World for DDoS; BGP Continues to Confound Security Teams 

As the world roils in turmoil on numerous fronts, bad actors are seizing the moment by stepping up DDoS activity.  The post It’s a Mad, Mad World for DDoS; BGP Continues to Confound Security Teams  appeared first on Security Boulevard.

Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management

Thales Named an Overall Leader in 2025 KuppingerCole Leadership Compass for Enterprise Secrets Management madhav Thu, 05/08/2025 - 06:31 We’re proud to share that Thales has been recognized as an Overall Leader in the 2025 KuppingerCole ...

Do the Math: Prime Number Breakthrough Could Upend Encryption 

When Way Kuo, a senior fellow at the Hong Kong Institute for Advanced Study, claimed in a working paper appearing in the SSRN Electronic Journal that his team had “devised a way to accurately and swiftly predict when prime numbers will ...

How agentic AI and non-human identities are transforming cybersecurity

Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single ...

Even the best safeguards can’t stop LLMs from being fooled

In this Help Net Security interview, Michael Pound, Associate Professor at the University of Nottingham shares his insights on the cybersecurity risks associated with LLMs. He discusses common organizational mistakes and the necessary precautions ...

Wave of tech layoffs leads to more job scams

The tech industry is experiencing significant layoffs, leaving thousands of IT and cybersecurity professionals in search of new employment opportunities. Unfortunately, as these individuals search for new opportunities, scammers are actively ...

Phishing-Resistant MFA: Why FIDO is Essential

Phishing-Resistant MFA: Why FIDO is Essential madhav Thu, 05/08/2025 - 04:47 Phishing attacks are one of the most pervasive and insidious threats, with businesses facing increasingly sophisticated and convincing attacks that exploit human ...