Application Security News and Articles


Why the Finance Sector Must Lead the Shift to Post-Quantum Cryptography

Quantum computing is not some far-off theory anymore, and the threat to today’s encryption is real with the clock running for organizations to be resilient. And for banks and finance organizations sitting on mountains of sensitive data, the ...

Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue 

Ox Security has raised a total $94 million since its launch in 2021 with ambitious plans to cash in on two fast-moving trends. The post Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  appeared first on SecurityWeek.

What Cybercriminals Have Been Up to Lately (And Why It Should Worry You)

Learn how to improve enterprise ransomware protection from ColorTokens' latest intel brief. The post What Cybercriminals Have Been Up to Lately (And Why It Should Worry You) appeared first on ColorTokens. The post What Cybercriminals Have Been Up ...

BSidesLV24 – Proving Ground – Threat Modeling At Scale: More Than Shifting Left

Author/Presenter: Troy Bowman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Harnessing AI to Create Auth and Register Pages: A Step-Wise Guide to Enhance UX

86% of users abandon websites due to poor authentication experiences. Discover how AI can transform your login and registration pages into conversion powerhouses that adapt to each user, prevent errors before they happen, and balance security ...

Detect and crash Chromium bots with one weird trick (bots hate it!)

Disclaimer: If you're here for the holy grail of bot detection, this may not be it, unless your UX strategy involves surprise popups and your marketing strategy involves blocking Google crawlers. We recently stumbled across a bug on the Chromium ...

xAI Secret Leak: The Story of a Disclosure

AI adoption accelerates secret sprawl as organizations connect to multiple providers. Our investigation of a leaked xAI API key, which granted access to unreleased Grok models, reveals critical flaws in their disclosure process, highlighting ...

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

By baking minimum expectations into procurement conversations, the plan is to steer software vendors to “secure-by-design and default” basics. The post New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA appeared first on ...

Spyware Maker NSO Ordered to Pay WhatsApp $168 Million for 2019 Hack

Meta, which owns WhatsApp, became the first company to sue and win against NSO Group, the maker of the notorious Pegasus spyware, when a U.S. ruled in December that the vendor hacked into 1,400 mobile devices in 2019. A jury ordered NSO Group to ...

Barracuda Networks strenghtens threat detection with multimodal AI

Barracuda Networks unveiled next-generation threat detection capabilities fueled by multimodal AI. Barracuda now delivers adaptive, context-aware protection against emerging attacks with accuracy and speed by simultaneously correlating and ...

Searchlight Cyber adds AI capabilities to summarize dark web posts and threads

Searchlight Cyber has launched new AI capabilities within its dark web investigations platform, Cerberus. The new Cerberus AI Insights feature summarizes dark web posts and threads to help analysts to quickly triage information and focus on the ...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

Austin, USA / Texas, 7th May 2025, CyberNewsWire The post SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks appeared first on Security Boulevard.

Sonatype welcomes Antoine Harden as Regional Vice President of Federal

Sonatype is thrilled to announce the addition of Antoine Harden as our Regional Vice President of Federal. With a proven track record of leadership and innovation, Antoine will spearhead sales efforts across the Department of Defense, the ...

Stronger Cloud Security in Five: Securing Your Cloud Identities

After covering cloud security posture management (CSPM) and cloud workload protection (CWP) in the first two installments of Tenable’s “Stronger Cloud Security in Five” blog series, today we focus on securing your cloud identities. ...

Verosint Vera boosts identity threat detection and response

Verosint launched Vera, an agentic AI security analyst to transform how organizations detect, investigate, and respond to identity-based threats. Built on top of Verosint’s intelligent ITDR platform, Vera is an always-on, expert identity ...

PoC exploit for SysAid pre-auth RCE released, upgrade quickly!

WatchTowr researchers have released a proof-of-concept (PoC) exploit that chains two vulnerabilities in SysAid On-Prem – the self-hosted version of the platform behind SysAid’s popular IT service management and IT helpdesk solutions ...

US Sanctions Myanmar Militia Involved in Cyber Scams 

The US has sanctioned Myanmar warlord Saw Chit Thu and his militia for their roles in cyber scams causing billions in losses to American victims. The post US Sanctions Myanmar Militia Involved in Cyber Scams  appeared first on SecurityWeek.

The 3 Stages of the Idea Cycle: From Raw Concept to Validated Solution

At ISHIR, we’ve worked with hundreds of innovators — startup founders, intrapreneurs, and enterprise technology leaders. And one thing is clear: Great ideas don’t come...Read More The post The 3 Stages of the Idea Cycle: From Raw Concept to ...

SaaS risk is on the rise: 7 action items for better management

The rapid rise in the use of SaaS applications — often without the IT organization's knowledge or consent — has spawned a whole new set of challenges for security teams. These include visibility gaps, unmanaged data flows, and an expanding ...

How VPNs and Account Takeovers Impact School Cybersecurity – And How Cloud Monitor Helps

In our recent live webinar, Ask Us Anything: Solving K-12 Tech Teams’ Biggest Challenges, we gave attendees the chance to get real answers to their top pain points by submitting questions in advance. The session featured Bob Boyd, Chief ...