Application Security News and Articles


Runlayer Emerges From Stealth Mode With $11 Million in Funding

The company has operated in stealth mode for four months and has signed dozens of customers, including eight unicorns. The post Runlayer Emerges From Stealth Mode With $11 Million in Funding appeared first on SecurityWeek.

Protecting User Data While Boosting Visibility: Secure SEO Strategies for Manufacturers

Learn how manufacturers can boost visibility while protecting user data with secure SEO, passwordless authentication, and privacy-first digital strategies. The post Protecting User Data While Boosting Visibility: Secure SEO Strategies for ...

Scaling Cyber: meet the next cybersecurity global leaders

Agentic Threat Hunting, Predictive Threat Intelligence, Disinformation Security & Cyber Deception and more The post Scaling Cyber: meet the next cybersecurity global leaders appeared first on Security Boulevard.

Salesforce Instances Hacked via Gainsight Integrations

The infamous ShinyHunters hackers have targeted customer-managed Gainsight-published applications to steal data from Salesforce instances. The post Salesforce Instances Hacked via Gainsight Integrations appeared first on SecurityWeek.

Skipping Threat Modeling? You’re Risking a Breach You Can’t Recover From

Even mature engineering teams often treat threat modeling as an optional exercise, relying instead on VAPT or other post-development assessments with the assumption that “we’ll fix issues later.” But this approach is risky and reactive. ...

New Onapsis platform updates enhance visibility and protection across SAP landscapes

Onapsis introduced a series of new updates to its Onapsis Control product line, advancing security capabilities across SAP and cloud ERP application development environments. These enhancements include integration with SAP Continuous Integration ...

Research shows identity document checks are missing key signals

Most CISOs spend their time thinking about account takeover and phishing, but identity document fraud is becoming a tougher challenge. A new systematic review shows how attackers are pushing past old defenses and how detection models are ...

What insurers really look at in your identity controls

Insurers judge organizations by the strength of their identity controls and by how consistently those controls are applied, according to a new Delinea report. CISOs are entering a market that rewards maturity and penalizes gaps that once passed ...

How one quick AI check can leak your company’s secrets

In this Help Net Security video, Dinesh Nagarajan, Global Partner, Cyber Security Services at IBM Consulting, walks through a situation in which an employee shared production source code with a public AI tool. The tool learned from the code, ...

Convenience culture is breaking personal security

AI is changing how scams are built, shared, and trusted. A new global survey from Bitdefender shows how far the problem has spread. AI is helping scams evolve faster than people can respond Over seven in ten consumers encountered some form of ...

New infosec products of the week: November 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Bedrock Data, Immersive, Kentik, Minimus, and Synack. Kentik AI Advisor brings intelligence and automation to network design and operations Kentik has ...

Fortinet FortiWeb Authentication Bypass and Command Injection Vulnerability (CVE-2025-64446/CVE-2025-58034) Notice

Overview Recently, NSFOCUS CERT detected that Fortinet issued a security bulletin to fix the FortiWeb authentication bypass and command injection vulnerability (CVE-2025-64446/CVE-2025-58034); Combined exploitation can realize unauthorized remote ...

What is Risk-Based Authentication?

Explore risk-based authentication (RBA) in detail. Learn how it enhances security and user experience in software development, with practical examples and implementation tips. The post What is Risk-Based Authentication? appeared first on Security ...

Unified Compliance with AI: Optimizing Regulatory Demands with Internal Tools

Key Takeaways What is Unified AI Oversight? In today’s AI landscape, organizations face overlapping regulations, ethical expectations, and AI operational risks. Unified AI oversight is a single lens to manage AI systems while staying aligned ...

Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island

Thailand’s Cyber Crime Investigation Bureau said an FBI tip that the “world-class hacker” was traveling to Thailand led to his arrest in Phuket. The post Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island appeared ...

Zoom’s AI Avatar Watermark Is Security Theatre (And Attackers Already Know It)

Zoom CEO Eric Yuan recently used his AI avatar to open a quarterly earnings call. In the top right corner of the video, a small badge appeared: "CREATED WITH ZOOM AI COMPANION." The post Zoom’s AI Avatar Watermark Is Security Theatre (And ...

Can effective Secrets Security fit within a tight budget

Are Budget-Friendly Security Measures Adequate for Managing Non-Human Identities? Where digital transformation is reshaping industries, the question of whether budget-friendly security solutions are adequate for managing Non-Human Identities ...

How do stable AI systems contribute to cloud security

How Does Stability in AI Systems Enhance Cloud Security? Have you ever wondered how stable AI systems can revolutionize your organization’s cloud security? When industries evolve, the integration of AI into cybersecurity provides unique ...

Why are experts optimistic about future AI security technology

How Secure Are Your Machine Identities in the Cloud Environment? Are machine identities flying under the radar when it comes to your cybersecurity strategy? Non-Human Identities (NHIs) are rapidly becoming a crucial element in organizations ...

Can enterprises freely choose scalable Agentic AI solutions

How Can Enterprises Make Informed Decisions About Scalable Agentic AI Solutions? Are enterprises truly free to choose scalable Agentic AI solutions that align with their evolving security needs? This question resonates across industries with ...