Application Security News and Articles


The 7 Best SAST Solutions for 2026: Balancing Speed, Accuracy, and Security Controls

The 7 SAST Legends Defining the Future of AppSec.Continue reading on DevSecOps & AI »

Impact of Poor PKI Management: Real-World Consequences and Solutions

Introduction Safety protocols in the virtual domain are perhaps more important than ever in the current world. There can be no denying that PKI management is one of the most crucial aspects of protecting our increasingly digital world. It is the ...

2026 Cyber Predictions: Accelerating AI, Data Sovereignty, and Architecture Rationalization 

2026 marks a critical turning point for cybersecurity leaders as AI-driven threats, data sovereignty mandates, and hybrid infrastructure risks reshape the CISO agenda. Discover the strategic priorities that will define tomorrow’s security ...

No DMARC record found: Fix this critical mistake

Seeing a "no DMARC record found" error for your domain? Learn what it means, how it exposes you to spoofing and BEC, and how to move safely to p=reject. The post No DMARC record found: Fix this critical mistake appeared first on Security Boulevard.

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear

The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances. The post China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear appeared first on SecurityWeek.

The soft underbelly of space isn’t in orbit, it’s on the ground

In this Help Net Security interview, Øystein Thorvaldsen, CISO at KSAT, discusses how adversaries view the ground segment as the practical way to reach space systems and why stations remain a focal point for security efforts. He notes that many ...

Privacy risks sit inside the ads that fill your social media feed

Regulatory limits on explicit targeting have not stopped algorithmic profiling on the web. Ad optimization systems still adapt which ads appear based on users’ private attributes. At the same time, multimodal LLMs have lowered the barrier for ...

Should AI access be treated as a civil right across generations?

AI use is expanding faster than the infrastructure that supports it, and that gap is starting to matter for security, resilience, and access. A new position paper argues that access to AI should be treated as an intergenerational civil right, ...

What cybersecurity leaders are reading to stay ahead

If you’re looking for holiday gift ideas, books remain one of the simplest ways to spark curiosity and support someone’s growth. Whether the person on your list is exploring cybersecurity, AI, engineering, or career development, these titles ...

Private Certificate Authority 101: From Setup to Management

Introduction Security has become a primary focus in today’s world, which is dominated by computers and technology. Businesses are always on a quest to find better ways how secure their information and messages. Another important component in ...

What’s Powering Enterprise AI in 2025: ThreatLabz Report Sneak Peek

As 2025 comes to a close, artificial intelligence (AI) is a clear throughline across enterprise organizations. Many teams are still in the thick of implementing AI or deciding where and how to use it. Keeping up with usage trends and developments ...

LLM10: Unbounded Consumption – FireTail Blog

Dec 17, 2025 - Lina Romero - The OWASP Top 10 for LLMs was released this year to help security teams understand and mitigate the rising risks to LLMs. In previous blogs, we’ve explored risks 1-9, and today we’ll finally be deep diving LLM10: ...

Homomorphic Encryption for Privacy-Preserving MCP Analytics in a Post-Quantum World

Explore homomorphic encryption for privacy-preserving analytics in Model Context Protocol (MCP) deployments, addressing post-quantum security challenges. Learn how to secure your AI infrastructure with Gopher Security. The post Homomorphic ...

What is NHIDR and why is it important

How Can Non-Human Identity Detection Revolutionize Cybersecurity? Could your company be overlooking a critical component in its cybersecurity strategy? Non-Human Identities (NHIs) and their secrets are becoming increasingly critical to manage ...

Why Venture Capital Is Betting Against Traditional SIEMs

And why most of the arguments do not hold up under scrutiny Over the past 18 to 24 months, venture capital has flowed into a fresh wave of SIEM challengers including Vega (which raised $65M in seed and Series A at a ~$400M valuation), Perpetual ...

CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006. Key takeaways: CVE-2025-40602 is a local privilege escalation vulnerability in the appliance ...

NDSS 2025 – Blindfold: Confidential Memory Management By Untrusted Operating System

Session 6B: Confidential Computing 1 Authors, Creators & Presenters: Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University) PAPER Blindfold: Confidential Memory Management by Untrusted Operating ...

Cisco email security appliances rooted and backdoored via still unpatched zero-day

A suspected Chinese-nexus threat group has been compromising Cisco email security devices and planting backdoors and log-purging tools on them since at least late November 2025, Cisco Talos researchers have shared. “Our analysis indicates ...

DataDome’s Commitment to the CISA Secure by Design Pledge

DataDome details how it aligns with CISA’s Secure by Design Pledge, outlining strong authentication, secure defaults, supply chain security, logging, and transparency. The post DataDome’s Commitment to the CISA Secure by Design Pledge ...

The Hidden Cost of “AI on Every Alert” (And How to Fix It)

Learn why running AI agents on every SOC alert can spike cloud costs. See how bounded workflows make agentic triage reliable and predictable. The post The Hidden Cost of “AI on Every Alert” (And How to Fix It) appeared first on D3 ...