Application Security News and Articles


Navigating PCI DSS 4.0 Compliance: How Automated Data Discovery Can Help

The Payment Card Industry Security Standards Council (PCI SSC) continues to evolve its flagship data security standard. The latest version encourages complying organizations to move away from traditional, periodic audits to a process of ...

Juniper Networks Patches Dozens of Junos Vulnerabilities

Juniper Networks has patched two dozen vulnerabilities in Junos OS and Junos OS Evolved, and dozens of flaws in Junos Space third-party dependencies. The post Juniper Networks Patches Dozens of Junos Vulnerabilities appeared first on SecurityWeek.

CyberArk releases identity security solution for AI agents

CyberArk announced the CyberArk Secure AI Agents Solution, which will allow organizations to implement identity-first security for agentic AI using the CyberArk Identity Security Platform. The solution will help organizations mitigate new and ...

What is DSPM? Understanding Data Security Posture Management

The post What is DSPM? Understanding Data Security Posture Management appeared first on Votiro. The post What is DSPM? Understanding Data Security Posture Management appeared first on Security Boulevard.

How BluOcean Cyber Revolutionized SaaS Security and Risk Management

Learn how BluOcean overcame its client’s challenges with SaaS misconfigurations and how AppOmni’s SaaS security platform helped build a scalable, proactive SaaS security program. The post How BluOcean Cyber Revolutionized SaaS Security and ...

Trump orders revocation of security clearances for Chris Krebs, SentinelOne

US President Donald Trump has signed an Executive Order on Wednesday to revoke security clearance held by Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), and his colleagues at SentinelOne. ...

PCI DSS Tokenization vs Encryption: Key Differences to Protect Payment Data

If your organization handles sensitive financial information, you must implement security measures that fulfill the Payment Card Industry Data Security Standard (PCI DSS) requirements. The most commonly used methods for securing cardholder data ...

Study Identifies 20 Most Vulnerable Connected Devices of 2025

Routers are the riskiest devices in enterprise networks as they contain the most critical vulnerabilities, a new Forescout report shows. The post Study Identifies 20 Most Vulnerable Connected Devices of 2025 appeared first on SecurityWeek.

Domain Reputation Update Oct 2024 – Mar 2025

New domains are up 7.39%, with 2.9 million malicious domains detected. Chinese gambling sites dominate the Top 20 TLDs, while .top remains a hotspot for abuse - this time with a spike in toll road scams. Read the full report here. The post Domain ...

Guidepoint Security & Enzoic: Taking on the Password Problem

Compromised passwords remain one of the most common—and preventable—ways attackers gain access to systems. Despite advancements in security tools, weak and reused credentials still leave organizations wide open to phishing, credential ...

GitHub Announces General Availability of Security Campaigns

GitHub security campaigns make it easier for developers and security teams to collaborate on fixing vulnerabilities in their applications. The post GitHub Announces General Availability of Security Campaigns appeared first on SecurityWeek.

Nissan Leaf Hacked for Remote Spying, Physical Takeover

Researchers find vulnerabilities that can be exploited to remotely take control of a Nissan Leaf’s functions, including physical controls. The post Nissan Leaf Hacked for Remote Spying, Physical Takeover appeared first on SecurityWeek.

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

Sensata has informed the SEC that shipping, manufacturing and other operations have been impacted by a ransomware attack. The post Operations of Sensor Giant Sensata Disrupted by Ransomware Attack appeared first on SecurityWeek.

FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887)

Fortinet has released patches for flaws affecting many of its products, among them a critical vulnerability (CVE-2024-48887) in its FortiSwitch appliances that could allow unauthenticated attackers to gain access to and administrative privileges ...

Embracing the Future: Mastering Your Cybersecurity Strategy With an Identity Driven Security Approach

In today's rapidly evolving digital landscape, taking control of your cybersecurity strategy is more crucial than ever. The post Embracing the Future: Mastering Your Cybersecurity Strategy With an Identity Driven Security Approach appeared first ...

AI is Reshaping Cyber Threats: Here’s What CISOs Must Do Now

Assess the risks posed by AI-powered attacks and adopt AI-driven defense capabilities to match. Automate where possible. Use AI to prioritise what matters. Invest in processes and talent that enable real-time response and build long-term ...

‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages

CAPTCHA-evading Python framework AkiraBot has spammed over 80,000 websites with AI-generated spam messages. The post ‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages appeared first on SecurityWeek.

What is Port 443 and why it’s needed for secure web browsing

Port 443 is the default gateway for HTTPS, enabling encrypted communication between browsers and web servers using SSL/TLS protocols. This article explains the role of Port 443 in secure data transmission, the differences between HTTPS and port ...

Seal Base Images mitigates container vulnerabilities

Seal Security launched Seal Base Images, a solution designed to future-proof containerized applications. Seal Base Images delivers secure, continuously updated, and vulnerability-free base images, effectively eliminating up to 99% of potential ...

The API Security Challenge in AI: Preventing Resource Exhaustion and Unauthorized Access

Agentic AI is transforming business. Organizations are increasingly integrating AI agents into core business systems and processes, using them as intermediaries between users and these internal systems. As a result, these organizations are ...