Application Security News and Articles


SolarWinds Patches Three Critical Serv-U Vulnerabilities

SolarWinds Serv-U is affected by vulnerabilities that can be exploited for remote code execution. The post SolarWinds Patches Three Critical Serv-U Vulnerabilities appeared first on SecurityWeek.

SaaS Black Friday deals For Developer 2025

Explore the best SaaS Black Friday deals for developers in 2025. Save big on passwordless login tools, AI apps, security platforms, and productivity software. The post SaaS Black Friday deals For Developer 2025 appeared first on Security Boulevard.

Is your password manager truly GDPR compliant?

Passwords sit at the core of every critical system, but many organizations still overlook how fragile their password workflows can be. When something goes wrong, security teams rush to uncover who had access, how those passwords were stored and ...

Google Play Store’s privacy practices still confuse Android users

Privacy rules like GDPR and CCPA are meant to help app stores be clearer about how apps use your data. But in the Google Play Store, those privacy sections often leave people scratching their heads. A new study looks at how users read these parts ...

BlueCodeAgent helps developers secure AI-generated code

When AI models generate code, they deliver power and risk at the same time for security teams. That tension is at the heart of the new tool called BlueCodeAgent, designed to help developers and security engineers defend against code-generation ...

SaaS tools Black Friday deals For Developer 2025

Explore the best SaaS tools Black Friday deals for developers in 2025. Save big on AI, security, automation, and productivity tools before offers expire. The post SaaS tools Black Friday deals For Developer 2025 appeared first on Security Boulevard.

The Advantages of Datacenter Proxies for Large-Scale Data Collection

Discover how datacenter proxies boost large-scale data collection with speed, scalability, and reliability. Learn benefits, use cases, and best practices. The post The Advantages of Datacenter Proxies for Large-Scale Data Collection appeared ...

The confidence trap holding security back

Security leaders often feel prepared for a major cyber incident, but performance data shows a different reality. Teams continue to miss key steps during practice scenarios, and the gap between confidence and capability keeps growing. Findings ...

Securing the Stateless Backend: Identity and Isolation in Java Microservices

The shift to stateless Java microservices orchestrated by platforms like Kubernetes fundamentally changes the security perimeter. The old…Continue reading on Medium »

When IT fails, OT pays the price

State groups, criminal crews, and hybrid operators are all using familiar IT entry points to reach systems that support industrial processes, according to the latest Operational Technology Threat Report from Trellix. The report covers attacks ...

JWTs for AI Agents: Authenticating Non-Human Identities

how JWTs secure AI agents and autonomous systems. Explore best practices for authenticating non-human identities using modern OAuth and token flows. The post JWTs for AI Agents: Authenticating Non-Human Identities appeared first on Security ...

Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal

The move to acquire Chronosphere is the latest of several acquisitions in recent years and follows a massive $25 billion deal to acquire CyberArk. The post Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal ...

Palo Alto Networks to Acquire AI Observability Platform Chronosphere for $3.35 Billion

Palo Alto Networks Inc. announced Wednesday it will acquire Chronosphere, a next-generation observability platform designed for artificial intelligence (AI) workloads, in a $3.35 billion deal combining cash and replacement equity awards. The ...

Black Friday Fraud: The Hidden Threat in Mobile Commerce

Every year, Black Friday drives a surge of online purchases—but it also opens the floodgates for fraud. While most conversations focus on phishing emails or sketchy websites, the real cybersecurity frontline for e-commerce lies behind the ...

The Security Landscape of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of ...

News alert: CredShields and Checkmarx partner to extend AppSec into Web3 and smart contracts

SINGAPORE, Nov. 19, 2025, CyberNewswire — The collaboration advances enterprise grade application security into decentralized ecosystems, uniting Checkmarx’s AppSec expertise with Web3 specialization by CredShields. CredShields, a leading ...

Are impenetrable AI-driven security systems realistic

Can AI-Driven Security Systems Truly Be Impenetrable? When considering the complexities of modern cybersecurity, one question arises: can AI-driven security systems be genuinely impenetrable? The pursuit of robust digital protection is a constant ...

What makes AI-driven PAM solutions powerful

How Can AI-Driven PAM Improve Non-Human Identity Management? Is your organization struggling to effectively manage and secure non-human identities (NHIs) amid the complexities of cloud environments? The answer may lie in leveraging AI-driven ...

Is investing in advanced NHIDR systems justified

Are Your Cybersecurity Measures Overlooking Non-Human Identities? Have you ever considered the vast number of machine identities interacting with your company’s systems and the potential security risks they pose? Managing Non-Human Identities ...

How are modern PAM solutions delivering value

The Strategic Role of Non-Human Identities in Modern PAM Solutions What exactly bridges the gap between robust security measures and seamless cloud operations? The answer often lies in understanding the growing importance of Non-Human Identities ...