Application Security News and Articles


SailPoint Harbor Pilot automates identity security tasks

SailPoint announced SailPoint Harbor Pilot, a set of AI agents designed to help identity teams work smarter, respond faster and secure their organizations more efficiently. Harbor Pilot automates identity security tasks, simplifies workflow ...

Getting the Most Value Out of the OSCP: The PEN-200 Labs

How to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance ...

Globalgig Premier SSE Management offers AI-driven network intelligence

Globalgig announced Premier SSE (Secure Service Edge) Management service, delivering a fully managed security solution designed to enhance the protection of company networks, applications, data, and users. Globalgig’s Managed SSE, powered by ...

Lasso Adds Automated Red Teaming Capability to Test LLMs

Lasso today added an ability to autonomously simulate real-world cyberattacks against large language models (LLMs) to enable organizations to improve the security of artificial intelligence (AI) applications. The post Lasso Adds Automated Red ...

Charm Security Emerges From Stealth With $8 Million in Funding

Charm Security has emerged from stealth mode with $8 million in funding for AI-powered scams and social engineering prevention. The post Charm Security Emerges From Stealth With $8 Million in Funding appeared first on SecurityWeek.

Fastly Bot Management update defends against scraping, account takeovers, and spam

Fastly announced a new update to Fastly Bot Management, delivering three key features that help organizations defend against scraping, account takeovers, and spam. For too long, websites have relied on frustrating CAPTCHAs to combat these ...

Run Security Leverages eBPF to Strengthen Application Security

Run Security today launched an application security platform that leverages extended Berkeley Packet Filtering (eBPF) to secure application runtime environments. The post Run Security Leverages eBPF to Strengthen Application Security appeared ...

Aligning Cybersecurity and Third-Party Risk Management with Business Goals

In the cybersecurity risk world, we often encounter the issue of not speaking the same language as the business. This […] The post Aligning Cybersecurity and Third-Party Risk Management with Business Goals appeared first on Security Boulevard.

CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups

Ramat Gan, Israel, 25th March 2025, CyberNewsWire The post CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups appeared first on Security Boulevard.

BlackCloak unveils Digital Executive Protection Framework

BlackCloak has released a new framework, Digital Executive Protection: Framework & Assessment Methodology, setting the standard for digital executive protection (DEP). Recent attacks on high-profile business leaders demonstrate a continuing ...

Numotion Data Breach Impacts Nearly 500,000 People

Email-related data breach suffered by wheelchair and other mobility equipment provider Numotion affects almost 500,000 individuals.  The post Numotion Data Breach Impacts Nearly 500,000 People appeared first on SecurityWeek.

The Illusion of Safety: BlackCloak’s DEP Security Framework Exposes the Devil’s Greatest Trick

On Tuesday, March 25, 2025, BlackCloak released a watershed asset in executive and public persona cybersecurity: The Digital Executive Protection (DEP) Framework & Assessment Methodology - a comprehensive standard designed to address the ...

Chinese APT Weaver Ant Targeting Telecom Providers in Asia

Weaver Ant, a cyberespionage-focused APT operating out of China, is targeting telecom providers for persistent access. The post Chinese APT Weaver Ant Targeting Telecom Providers in Asia appeared first on SecurityWeek.

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort. The post Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs ...

Addressing Security Challenges in Cloud-Based Social Networks

SDN offers a flexible, intelligent solution to address these challenges, empowering platforms to optimize performance, allocate resources effectively, enhance security and deliver seamless user experiences.  The post Addressing Security ...

Report on Paragon Spyware

Citizen Lab has a new report on Paragon’s spyware: Key Findings: Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware called Graphite. The company differentiates itself by claiming it has safeguards ...

Hacker Conversations: Frank Trezza – From Phreaker to Pentester

Frank Trezza is fairly typical of most hackers. Early pranks sometimes leading to something more serious. The post Hacker Conversations: Frank Trezza – From Phreaker to Pentester appeared first on SecurityWeek.

The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge

The vendor dependency trap is crippling security teams. AI is democratizing building capabilities that were once vendor-exclusive. Develop these five critical skills now before your competitors do. The post The Builder Strikes Back: How Security ...

300 Arrested in Crackdown on Cybercrime Rings in Africa

Authorities in seven African countries arrested 300 suspects in an international crackdown on cybercriminal networks targeting businesses. The post 300 Arrested in Crackdown on Cybercrime Rings in Africa appeared first on SecurityWeek.

IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking

Critical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes. The post IngressNightmare Flaws Expose Many Kubernetes Clusters to Remote Hacking appeared first on SecurityWeek.