Application Security News and Articles


From Compromise to Control: The ATO Prevention Plan for 2026

According to IBM’s 2025 Cost of a Data Breach report, breaches initiated with stolen credentials take an average of 246 days to identify and contain. That is more than eight months of undetected access. Eight months of reconnaissance. Eight ...

Threat Detection Software: The Complete Guide to Protecting Your Digital Assets in 2026

The cybersecurity landscape in 2026 presents unprecedented challenges for organizations across all industries. With cybercrime damages projected to exceed $10.5 trillion annually, enterprises face sophisticated threats from attackers leveraging ...

WatchGuard Firebox firewalls under attack (CVE-2025-14733)

More than 115,000 internet-facing WatchGuard Firebox firewalls may be vulnerable to compromise via CVE-2025-14733, a remote code execution vulnerability actively targeted by attackers, Shadowserver’s latest scanning reveals. About ...

DIG AI: Uncensored darknet AI assistant at the service of criminals and terrorists

Resecurity has identified the emergence of uncensored darknet AI assistants, enabling threat actors to leverage advanced data processing capabilities for malicious purposes. One of these – DIG AI – was identified on September 29 of ...

Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US

Artem Stryzhak pleaded guilty to conspiracy to commit computer fraud after he was extradited earlier this year. The post Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US appeared first on SecurityWeek.

Zero Trust AI Security: The Comprehensive Guide to Next-Generation Cybersecurity in 2026

The traditional perimeter-based security model has become obsolete in today’s distributed digital environment. With 82% of organizations now operating in hybrid or multi-cloud infrastructures and remote work becoming the standard, the concept ...

Docker makes hardened images free open and transparent for everyone

Docker has made its open source Docker Hardened Images project available at no cost for every developer and organization. The catalog contains more than 1,000 container images built on open source distributions such as Debian and Alpine and is ...

WatchGuard Patches Firebox Zero-Day Exploited in the Wild

The critical-severity bug in the Fireware OS’s iked process leads to unauthenticated remote code execution. The post WatchGuard Patches Firebox Zero-Day Exploited in the Wild appeared first on SecurityWeek.

574 arrests, $3 million recovered in Africa-wide cybercrime crackdown

Law enforcement agencies across 19 countries arrested 574 suspects and recovered approximately $3 million during a major cybercrime operation spanning Africa. Suspects were arrested in Ghana in connection to the cyber-fraud case, with over 100 ...

10 Best Multi-Factor Authentication Solutions in 2026

Explore the 10 best MFA solutions in 2026. Compare features, pricing, pros, cons, and find the right multi-factor authentication tool for your business. The post 10 Best Multi-Factor Authentication Solutions in 2026 appeared first on Security ...

UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports

The British government is investigating a “cyber incident” following news reports that hackers linked to China have gained access to thousands of confidential documents. The post UK Government Acknowledges It Is Investigating Cyber Incident ...

15 Best Passwordless Authentication Solutions in 2026

Compare the 15 best passwordless authentication solutions for 2026. Explore features, pricing, use cases, and how to choose the right tool. The post 15 Best Passwordless Authentication Solutions in 2026 appeared first on Security Boulevard.

Building cyber talent through competition, residency, and real-world immersion

In this Help Net Security interview, Chrisma Jackson, Director of Cybersecurity & Mission Computing Center and CISO at Sandia National Laboratories, reflects on where the cyber talent pipeline breaks down and what it takes to fix it. She ...

Browser agents don’t always respect your privacy choices

Browser agents promise to handle online tasks without constant user input. They can shop, book reservations, and manage accounts by driving a web browser through an AI model. A new academic study warns that this convenience comes with privacy ...

9 MFA Mistakes in Manufacturing IT and Fixes

Discover the most common MFA mistakes in manufacturing IT and learn practical fixes to improve security, uptime, and authentication on factory floors. The post 9 MFA Mistakes in Manufacturing IT and Fixes appeared first on Security Boulevard.

Anubis: Open-source web AI firewall to protect from scraper bots

Anubis is an open-source tool designed to protect websites from automated scraping and abusive traffic by adding computational friction before a request is served. Maintained by TecharoHQ, the project targets a growing problem for site operators ...

Session tokens give attackers a shortcut around MFA

In this Help Net Security video, Simon Wijckmans, CEO at cside, discusses why session token theft is rising and why security teams miss it. He walks through how web applications rely on browsers to store session tokens after login often in ...

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, ...

NIST issues guidance on securing smart speakers

Smart home devices, such as voice-activated digital assistants, are increasingly used in home health care, with risks involved. An attacker could change a prescription, steal medical data, or connect a patient to an impostor. To reduce ...

Authentication Platform Comparison: Best Authentication Systems & Tools for Your Business

Compare leading authentication platforms like Okta, Auth0, and open-source tools. Find the best authentication system for your business needs, balancing security, cost, and scalability. The post Authentication Platform Comparison: Best ...