Application Security News and Articles


The year ahead in cyber: What’s next for cybersecurity in 2026

In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst at Symantec, outlines the major cyber risks expected in 2026. He explains that attackers are often breaching networks by targeting people instead of exploiting ...

Building a Unified SAST + DAST Security Pipeline (Our Next Step in DevSecOps)

Rajesh Thakur | DevOps Engineer @ Deploycrafts |Continue reading on DevOps.dev »

The next tech divide is written in AI diffusion

AI is spreading faster than any major technology in history, according to a Microsoft report. More than 1.2 billion people have used an AI tool within three years of the first mainstream releases. The growth is fast, but it puts uneven pressure ...

OWASP Top 10 for 2025: What’s New and Why It Matters

In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the ...

NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator

Incident Summary On October 21, 2025, NSFOCUS Cloud DDoS Protection Service (Cloud DPS) detected and mitigated an 800G+ DDoS attack towards a critical infrastructure operator. The target network sustained a multi-vector volumetric DDoS attack ...

What Are the Most Popular Single Sign-On Options?

Explore the most popular single sign-on (SSO) options available today. Learn about SAML, OIDC, and other SSO methods to secure your enterprise applications. The post What Are the Most Popular Single Sign-On Options? appeared first on Security ...

What Are the Limitations of Passkeys?

Explore the limitations of passkeys in authentication. Learn about device dependency, adoption challenges, interoperability issues, and recovery complexities to make informed decisions. The post What Are the Limitations of Passkeys? appeared ...

Can NHIDR technologies fully protect my cloud data

How Secure Is Your Cloud Environment? Has your organization truly fortified its cloud environment against potential threats? Evolving cybersecurity continually presents new challenges, especially when it comes to protecting digital assets. ...

How proactive should your Secrets Rotation strategy be

How Do Non-Human Identities Fit Into Cybersecurity? Have you ever considered how machine identities play a crucial role in cybersecurity? Non-Human Identities (NHIs) are at the heart of modern security strategies, especially when managing secrets ...

What tools empower better Secrets Security management

How Can Secrets Security Management Tools Strengthen Your Cybersecurity Strategy? Have you ever considered how machine identities can transform your cybersecurity approach? With the growing complexity of digital environments, particularly in ...

How do I ensure my Agentic AI systems are safe

What Are Non-Human Identities (NHIs) and Why Are They Crucial for Safe Agentic AI? Have you considered the growing importance of Non-Human Identities (NHIs), especially when it comes to safeguarding Agentic AI systems? Where organizations across ...

Google Uses Courts, Congress to Counter Massive Smishing Campaign

Google is suing the Smishing Triad group behind the Lighthouse phishing-as-a-service kit that has been used over the past two years to scam more than 1 million people around the world with fraudulent package delivery or EZ-Pass toll fee messages ...

NDSS 2025 – Magmaw: Modality-Agnostic Adversarial Attacks

SESSION Session 3B: Wireless, Cellular & Satellite Security Authors, Creators & Presenters: Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego), Nasimeh Heydaribeni (University of California, ...

Can You Future-Proof Your Life in the Age of AI? (Book Review)

In his book Comfort Override: Future-Proof Your Life as AI Flips Your World, Ranan Lachman explores how we can prepare and adapt for unprecedented change and offers practical, hands-on help. The post Can You Future-Proof Your Life in the Age of ...

Week in review: Windows kernel flaw patched, suspected Fortinet FortiWeb zero-day exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Adopting a counterintelligence mindset in luxury logistics In this Help Net Security interview, Andrea Succi, Group CISO at Ferrari Group, ...

MY TAKE: AI’s fortune-teller effect — why it’s all too easy to mistake pattern mastery for wisdom

I hadn’t expected the machine’s answer to be that good. Related: The AI bubble is inflating It was a simple prompt — I needed help crafting a reply to a client. One of those mid-project check-ins where timing gets murky … (more…) The ...

How does Secrets Management contribute to compliance

Are You Managing Non-Human Identities with the Care They Deserve? Digital interconnected has seen a growing emphasis on cybersecurity measures that ensure both data integrity and user privacy. While more organizations migrate their operations to ...

How do you scale Non-Human Identity management safely

Are Non-Human Identities the Hidden Vulnerability in Your Cybersecurity Strategy? Non-Human Identities (NHIs) have emerged as a crucial component of cybersecurity. But how well are they being managed? This question confronts organizations across ...

Why is Agentic AI critical for future cybersecurity

Have You Considered the Impact of Non-Human Identities on Cybersecurity? The future of cybersecurity is being reshaped by the rise of Agentic AI, but how does this affect our approach to managing Non-Human Identities (NHIs)? With cybersecurity ...

What impact does Agentic AI have on cloud-native security

How Can Organizations Safeguard Non-Human Identities in the Age of Agentic AI? How can robust management of Non-Human Identities (NHIs) and Secrets Security Management tighten your organization’s cybersecurity defenses? While the concept might ...