Application Security News and Articles


Building a Capable NHI Infrastructure That Lasts

Why Is Effective NHI Infrastructure Critical for Sustainable Security? Where digital transformation is driving business innovation, many organizations are eyeing the cloud for its limitless possibilities. But how do companies secure their digital ...

Innovating NHIs for Better Cloud Security

Are You Leveraging the Full Potential of Non-Human Identities for Cloud Security? Where every second counts and breaches loom ominously, the spotlight increasingly turns to Non-Human Identities (NHIs). These machine identities, intricately woven ...

Assured Compliance through NHI Lifecycle Management

How Can Organizations Ensure Compliance through Effective NHI Lifecycle Management? Where data breaches and cyber threats are increasingly pervasive, how can organizations safeguard their operations while ensuring compliance? The answer lies ...

Adobe Patches 29 Vulnerabilities

Adobe has fixed InDesign, InCopy, Photoshop, Illustrator, Pass, Substance 3D Stager, and Format Plugins vulnerabilities. The post Adobe Patches 29 Vulnerabilities appeared first on SecurityWeek.

The Limitations of Google Play Integrity API (ex SafetyNet)

Updated November 2025 This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. The ...

Microsoft Patches Actively Exploited Windows Kernel Zero-Day

Microsoft’s latest Patch Tuesday updates address more than 60 vulnerabilities in Windows and other products. The post Microsoft Patches Actively Exploited Windows Kernel Zero-Day appeared first on SecurityWeek.

Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform

Tel Aviv, Israel based Tenzai has developed an AI-driven platform for penetration testing, which it says can continuously identify and address vulnerabilities. The post Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting ...

The New MSSP Mandate: Visibility into Data Risk, Not Just Endpoints

MSSPs can’t stop at endpoint protection. Learn why visibility into data risk is the new mandate—and how DSPM helps providers deliver data-first security. The post The New MSSP Mandate: Visibility into Data Risk, Not Just Endpoints appeared ...

Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)

5Critical 58Important 0Moderate 0Low Microsoft addresses 63 CVEs including one zero-day vulnerability which was exploited in the wild. Microsoft patched 63 CVEs in its November 2025 Patch Tuesday release, with five rated critical, and 58 rated ...

Just-in-Time Access for Workloads: Eliminating Standing Privileges

7 min readReplace static credentials with JIT access and ephemeral tokens. Eliminate standing privileges for workloads. Complete implementation guide included. The post Just-in-Time Access for Workloads: Eliminating Standing Privileges appeared ...

License Plates to Lateral Movement: How a School Probability Trick Helps Model It

Figure 1: LATERAL = 1ATE241 license plate School Math: A Car‑ride Probability Puzzle Driving my daughter to school, we were discussing a classic probability question: “What are the odds a 4‑digit license plate has at least one repeated ...

Integrate MojoAuth with Popular SaaS Kits like ShipFast, Divjoy, SaaS Pegasus, and Supastarter for Next-Gen Passwordless Login

Learn how MojoAuth enhances popular SaaS development kits like ShipFast, Supastarter, Divjoy, and SaaS Pegasus with powerful passwordless authentication — including passkeys, OTPs, and WebAuthn support. The post Integrate MojoAuth with Popular ...

CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042)

CISA has added CVE-2025-21042, a vulnerability affecting Samsung mobile devices, to its Known Exploited Vulnerabilities (KEV) catalog, and has ordered US federal civilian agencies to address it by the start of December. “This type of ...

Critical Triofox Vulnerability Exploited in the Wild

A threat actor has exploited the issue to create a new administrator account and then used the account to execute remote access tools. The post Critical Triofox Vulnerability Exploited in the Wild appeared first on SecurityWeek.

Action1 addresses Intune gaps with patching and risk-based vulnerability prioritization

Action1 announced new integrations that extend Microsoft Intune with advanced patching and vulnerability management. The enhancements close security and compliance gaps in Intune by adding comprehensive third-party application patching, ...

Red Hat OpenShift 4.20 unifies enterprise IT, from virtual machines to AI workloads

Red Hat has announced OpenShift 4.20, the latest version of its hybrid cloud application platform built on Kubernetes. Red Hat OpenShift 4.20 introduces capabilities for accelerating AI workloads, strengthening core platform security and ...

How Detection Engineers Can Turn Procedures into Actionable Coverage

Detection engineers are at the core of modern security operations and their success depends on knowing what detections to prioritize and how to measure success. But high-level frameworks and disconnected data streams can leave them without ...

Germany takes first step toward quantum-secure national ID cards

Since its introduction in 2010, Germany’s national ID card with its built-in online identification feature has set a high standard for security. The next generation must now withstand potential quantum-computer attacks, covering both hardware ...

Compliance-Ready Auth Without Enterprise Bloat

Compliance-Ready Auth Without Enterprise Bloat The post Compliance-Ready Auth Without Enterprise Bloat appeared first on Security Boulevard.

New Firefox Protections Halve the Number of Trackable Users

Mozilla has implemented fresh fingerprinting protections to prevent hidden trackers from identifying Firefox users. The post New Firefox Protections Halve the Number of Trackable Users appeared first on SecurityWeek.