Application Security News and Articles


Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape

Check Point’s Q2 2025 Ransomware Report reveals the collapse of major RaaS groups like LockBit and RansomHub, giving rise to a new, fragmented wave of ransomware actors. The post Law Enforcement Pressure is Reshaping the Global Ransomware ...

The Risks of Polywork: Digital Recruitment and Insider Threats

Nisos The Risks of Polywork: Digital Recruitment and Insider Threats Not long ago, the idea of someone holding two full-time jobs at once sounded like an outlier. Now, in the age of remote work... The post The Risks of Polywork: Digital ...

Which Industries Are Most at Risk for DDoS Attacks?

Distributed Denial-of-Service (DDoS) attacks pose a significant threat to companies across various industries. But the risk is not the same for everyone. The DRS Board, the governing body behind the DDoS Resiliency Score (DRS) standard, has ...

DraftKings Warns Users of Credential Stuffing Attacks

Hackers accessed user accounts and compromised names, addresses, phone numbers, email addresses, and other information. The post DraftKings Warns Users of Credential Stuffing Attacks appeared first on SecurityWeek.

Turn Compliance into a Competitive Advantage: How to Scale Privacy-Aligned Services

Learn how MSSPs can transform compliance from a burden into a competitive advantage by scaling privacy-aligned services with DSPM. The post Turn Compliance into a Competitive Advantage: How to Scale Privacy-Aligned Services appeared first on ...

Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching

Hundreds of internet-exposed Oracle E-Business Suite instances may still be vulnerable to attacks. The post Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching appeared first on SecurityWeek.

Netskope UZTNA adds policy control by device posture, risk, and role

Netskope has enhanced its Universal Zero Trust Network Access (UZTNA) solution. Comprised of Netskope One Private Access and Netskope Device Intelligence, Netskope’s UZTNA solution extends beyond the core use case of delivering fast, ...

CyberArk unveils new capabilities to reduce risk across human and machine identities

CyberArk announced new discovery and context capabilities across its Machine Identity Security portfolio. The enhancements enable security teams to find, understand and secure machine identities, spanning certificates, keys, secrets, workloads ...

Roll your own bot detection: fingerprinting/JavaScript (part 1)

This is the first article in a two-part series where we show how to build your own anti-bot system to protect a login endpoint, without relying on third-party services. Why write this? Many bot detection solutions, reCAPTCHA, Turnstile, or ...

Radiflow360 unifies OT risk, compliance, and response

Radiflow has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized ...

Rethinking AI security architectures beyond Earth

If you think managing cloud security is complex, try doing it across hundreds of satellites orbiting the planet. Each one is a moving endpoint that must stay secure while communicating through long, delay-prone links. A new study explores how AI ...

DefectDojo: Open-source DevSecOps platform

DefectDojo is an open-source tool for DevSecOps, application security posture management (ASPM), and vulnerability management. It helps teams manage security testing, track and remove duplicate findings, handle remediation, and generate reports. ...

Developing economies are falling behind in the fight against cybercrime

Cybercrime is a global problem, but not every country is equally equipped to fight it. In many developing economies, cybersecurity is still seen as a luxury, something nice to have when budgets allow. That means little investment in tools, ...

New system aims to keep people connected when networks fail

When disaster strikes, communication often fails. Cell towers can go offline, internet connections can disappear, and people are left without a way to share information or ask for help. A new research project looks at how to keep people talking ...

Purdue 2.0? : Rising to the Challenge to secure OT with Zero Trust Connectivity

Our connected world is getting dangerously messy. Demands on the effective protection of OT environments has never been greater than it is today. This is only growing. Cybercrime is becoming more organized with RaaS and the internal threat is ...

AI testing – harder than it looks

As AI overload becomes a real thing, ominous, outsized claims are becoming annoyingly de rigueur. But testing those claims against real-world frameworks and threat vectors are harder than it seems. We should know, we’re doing it. For us, this ...

News alert: INE Security report finds cyber-IT silos leave teams exposed — cross-training urged

RALEIGH, N.C., Oct. 7, 2025, CyberNewswire – INE Security, a leading provider of cybersecurity training and certifications, today announced the results of a global study examining the convergence of networking and cybersecurity ...

Reassuring Stakeholders with Solid Secrets Management

How Can Non-Human Identities Transform Secrets Management? Imagine where machine identities, much like human ones, silently pave the way for successful operations across diverse industries. How are these Non-Human Identities (NHIs) reshaping ...

Enhancing Data Protection with Advanced PAM Techniques

How Do Advanced PAM Techniques Enhance Data Protection? Where cybersecurity threats are constantly evolving, how can organizations ensure that their data remains protected? One of the most effective strategies is implementing advanced Privileged ...

Justifying Investments in NHI Security

How Can Non-Human Identities Bridge Security Gaps in Cloud Environments? Have you considered how the management of Non-Human Identities (NHIs) can transform your organization’s approach to cloud security? With the rapid digitalization across ...