Application Security News and Articles


Assura Named to MSSP Alert and Cyber Alliance’s 2025 “Top 250 MSSPs,” Ranking at Number 94

FOR IMMEDIATE RELEASE Richmond, VA — December 11, 2025 — Assura is proud to announce that it has been named to the MSSP Alert and CyberRisk Alliance partnership’s prestigious Top 250 MSSPs list for 2025, securing the #94 position among ...

Google Finds Five China-Nexus Groups Exploiting React2Shell Flaw

Researchers with Google Threat Intelligence Group have detected five China-nexus threat groups exploiting the maximum-security React2Shell security flaw to drop a number of malicious payloads, from backdoors to downloaders to tunnelers. The post ...

Why is secrets management vital for Agentic AI operations

Are Your Non-Human Identities (NHIs) and Secrets Truly Secure? Understanding the Importance of Securing Non-Human Identities Have you ever wondered how secure your organization’s machine identities are? Managing Non-Human Identities (NHIs) ...

How can NHIs scale security in cloud-native environments

How Secure Are Your Non-Human Identities in Cloud-Native Environments? How often do we consider the security gaps introduced by non-human identities (NHIs)? While much focus is placed on human identity protection, the oversight of NHIs—machine ...

How do NHIs enhance identity and access management

Why Are Non-Human Identities Vital in Identity and Access Management? In what ways do Non-Human Identities (NHIs) enhance identity and access management (IAM)? Where organizations expand their digital footprints, the management of NHIs becomes a ...

Leading Through Ambiguity: Decision-Making in Cybersecurity Leadership

Ambiguity isn't just a challenge. It's a leadership test - and most fail it. I want to start with something that feels true but gets ignored way too often. Most of us in leadership roles have a love hate relationship with ambiguity. We say we ...

NDSS 2025 – Selective Data Protection against Memory Leakage Attacks for Serverless Platforms

Session 6B: Confidential Computing 1 Authors, Creators & Presenters: Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University) PAPER LeakLess: Selective ...

News Alert: Link11’s Top 5 cybersecurity trends set to shape European defense strategies in 2026

Frankfurt, Dec. 16, 2025, CyberNewswire — Link11, a European provider of web infrastructure security solutions, has released new insights outlining five key cybersecurity developments expected to influence how organizations across Europe ...

Code Execution in Jupyter Notebook Exports

After our research on Cursor, in the context of developer-ecosystem security, we turn our attention to the Jupyter ecosystem. We expose security risks we identified in the notebook’s export functionality, in the default Windows environment, to ...

BlindEagle Targets Colombian Government Agency with Caminho and DCRAT

IntroductionIn early September 2025, Zscaler ThreatLabz discovered a new spear phishing campaign attributed to BlindEagle, a threat actor who operates in South America and targets users in Spanish-speaking countries, such as Colombia. In this ...

Veza Extends Reach to Secure and Govern AI Agents

Veza has added a platform to its portfolio that is specifically designed to secure and govern artificial intelligence (AI) agents that might soon be strewn across the enterprise. Currently in the process of being acquired by ServiceNow, the ...

The Future of Network Security Policy Management in a Zero Trust World

Zero Trust has become the strategic anchor for modern cybersecurity. Every board is asking for it, every vendor claims to support it, and every CISO is under pressure to make... The post The Future of Network Security Policy Management in a Zero ...

SecureIQLab Establishes APAC Office in Kathmandu, Nepal

SecureIQLab has officially established its Asia-Pacific (APAC) office in Kathmandu, Nepal, marking a significant milestone in expanding independent cybersecurity validation and advisory services across the region.  The new APAC office ...

Real Attacks of the Week: How Spyware Beaconing and Exploit Probing Are Shaping Modern Intrusions

Over the past week, enterprise security teams observed a combination of covert malware communication attempts and aggressive probing of publicly exposed infrastructure. These incidents, detected across firewall and endpoint security layers, ...

From Open Source to OpenAI: The Evolution of Third-Party Risk

From open source libraries to AI-powered coding assistants, speed-driven development is introducing new third-party risks that threat actors are increasingly exploiting. The post From Open Source to OpenAI: The Evolution of Third-Party Risk ...

How test data generators support compliance and data privacy

Whether you’re generating data from scratch or transforming sensitive production data, performant test data generators are critical tools for achieving compliance in development workflows. The post How test data generators support compliance ...

Seceon Announces Strategic Partnership with InterSources Inc. to Expand Delivery of AI-Driven Cybersecurity Across Regulated Industries

As cyber threats against regulated industries continue to escalate in scale, sophistication, and financial impact, organizations are under immense pressure to modernize security operations while meeting strict compliance requirements. Addressing ...

Imperva Partners with TollBit to Power AI Traffic Monetization for Content Owners

The surge in AI-driven traffic is transforming how websites manage their content. With AI bots and agents visiting sites at unprecedented rates (often scraping without permission, payment, or attribution) content owners face a critical challenge: ...

Can a Transparent Piece of Plastic Win the Invisible War on Your Identity?

Identity systems hold modern life together, yet we barely notice them until they fail. Every time someone starts a new job, crosses a border, or walks into a secure building, an official must answer one deceptively simple question: Is this person ...

Inside Our AI SOC: How Swimlane Cut MTTR in Half

The post Inside Our AI SOC: How Swimlane Cut MTTR in Half appeared first on AI Security Automation. The post Inside Our AI SOC: How Swimlane Cut MTTR in Half appeared first on Security Boulevard.