Application Security News and Articles


Uneven regulatory demands expose gaps in mobile security

Mobile networks carry a great deal of the world’s digital activity, which makes operators a frequent target for attacks. A study released by the GSMA shows that operators spend between $15 and $19 billion a year on core cybersecurity functions. ...

New infosec products of the week: December 12, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Apptega, Backslash Security, BigID, Black Kite, Bugcrowd, NinjaOne, Nudge Security, and Veza. Apptega Policy Manager streamlines policy creation and ...

Hong Kong’s New Critical Infrastructure Ordinance will be effective by 1 January 2026 – What CIOs Need to Know

As the clock ticks down to the full enforcement of Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Ordinance on January 1, 2026, designated operators of Critical Infrastructures (CI) and Critical Computer Systems (CCS) ...

Trump Signs Executive Order to Block State AI Regulations

Members of Congress from both parties have pushed for more regulations on AI, saying there is not enough oversight for the powerful technology. The post Trump Signs Executive Order to Block State AI Regulations appeared first on SecurityWeek.

Behavioral Analysis of AI Models Under Post-Quantum Threat Scenarios.

Explore behavioral analysis techniques for securing AI models against post-quantum threats. Learn how to identify anomalies and protect your AI infrastructure with quantum-resistant cryptography. The post Behavioral Analysis of AI Models Under ...

Learn about changes to your online account management

Discover the latest changes in online account management, focusing on Enterprise SSO, CIAM, and enhanced security. Learn how these updates streamline login processes and improve user experience. The post Learn about changes to your online account ...

Is Facial Recognition Classified as a Passkey?

Explore if facial recognition meets the criteria to be classified as a passkey. Understand the security, usability, and standards implications for passwordless authentication. The post Is Facial Recognition Classified as a Passkey? appeared first ...

News alert: INE sees surge in Q4 budget shifts as enterprises embrace hands-on training for AI roles

CARY, N.C., Dec. 11, 2025, CyberNewswire — With 90% of organizations facing critical skills gaps (ISC2) and AI reshaping job roles across cybersecurity, cloud, and IT operations, enterprises are rapidly reallocating L&D budgets toward ...

Can secrets vaulting bring calm to your data security panic?

How Can Organizations Securely Manage Non-Human Identities in Cloud Environments? Have you ever wondered how the rapid growth in machine identities impacts data security across various industries? With technology continues to advance, the ...

Are your cybersecurity needs satisfied with current NHIs?

How Secure Are Your Non-Human Identities? Are your cybersecurity needs truly satisfied by your current approach to Non-Human Identities (NHIs) and Secrets Security Management? With more organizations migrate to cloud platforms, the challenge of ...

How can cloud compliance make you feel relieved?

Are You Managing Non-Human Identities Effectively in Your Cloud Environment? One question that often lingers in professionals is whether their current strategies for managing Non-Human Identities (NHIs) provide adequate security. These NHIs are ...

How does staying ahead with NHIDR impact your business?

How Does NHIDR Influence Your Cybersecurity Strategy? What role do Non-Human Identity and Secrets Security Management (NHIDR) play in safeguarding your organization’s digital assets? The management of NHIs—machine identities created through ...

Utilizing Metrics for a Healthy SOC

Continuously improve your SOC through the analysis of security metrics.  Introduction Metrics are quantifiable measures and assessment results. They empower organizations to describe and measure controls and processes, and make rational ...

Chain Reaction: Attack Campaign Activity in the Aftermath of React Server Components Vulnerability

Introduction and Vulnerability Overview  Earlier this month, Imperva published an initial advisory outlining how our customers were protected against the newly disclosed React2Shell vulnerability impacting React Server Components ...

From Chatbot to Code Threat: OWASP’s Agentic AI Top 10 and the Specialized Risks of Coding Agents

  The post From Chatbot to Code Threat: OWASP’s Agentic AI Top 10 and the Specialized Risks of Coding Agents appeared first on Security Boulevard.

NDSS 2025 – URVFL: Undetectable Data Reconstruction Attack On Vertical Federated Learning

Session 5C: Federated Learning 1 Authors, Creators & Presenters: Duanyi Yao (Hong Kong University of Science and Technology), Songze Li (Southeast University), Xueluan Gong (Wuhan University), Sizai Hou (Hong Kong University of Science and ...

Rethinking Security as Access Control Moves to the Edge

The convergence of physical and digital security is driving a shift toward software-driven, open-architecture edge computing. Access control has typically been treated as a physical domain problem — managing who can open which doors, using ...

Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority

OT oversight is an expensive industrial paradox. It’s hard to believe that an area can be simultaneously underappreciated, underfunded, and under increasing attack. And yet, with ransomware hackers knowing that downtime equals disaster and ...

Backbase CISO: Defending Banking Apps at Runtime

There’s a major problem in application security: Organizations secure code before release, but attackers strike in production. This gap is exactly where runtime application security comes in. The post Backbase CISO: Defending Banking Apps at ...

Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks

Modern internet users navigate an increasingly fragmented digital ecosystem dominated by countless applications, services, brands and platforms. Engaging with online offerings often requires selecting and remembering passwords or taking other ...