Application Security News and Articles


Emulating the Sophisticated Chinese Adversary Salt Typhoon

AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Chinese adversary Salt Typhoon. The post Emulating the Sophisticated ...

Phishing: A Persistent Threat in the Age of AI dup

Phishing is one of the most common and dangerous cyber threats facing organizations today. Despite growing awareness, employees often still fall victim to these attacks. Even worse, cybercriminals now have more sophisticated tools at their ...

How to detect Headless Chrome bots instrumented with Playwright?

Headless Chrome bots powered by Playwright have become a go-to tool for bot developers due to their flexibility and efficiency. Playwright’s cross-browser capabilities, coupled with an API similar to Puppeteer and the lightweight nature of ...

Trend Micro Open Sources Cybertron LLM for Cybersecurity

Trend Micro today announced it will open source a Cybertron large language model (LLM) specifically trained to automate a wide range of cybersecurity tasks. The post Trend Micro Open Sources Cybertron LLM for Cybersecurity appeared first on ...

HP Intros Printers with Protection Against Quantum Cyberattacks

HP this week introduced new HP printers that include protections against cyberthreats posed by future quantum computers, which could arrive earlier than expected thanks to recent developments. With the new printers, HP also is addressing ...

The Importance of Code Signing Best Practices in the Software Development Lifecycle

To ensure a secure software supply chain, the need for robust security measures cannot be overstated. One such measure, which serves as a cornerstone for safeguarding software authenticity and integrity, is code signing. Code signing is a process ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #329 – No Nitty-Gritty

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP

Orion protects against data exfiltration by using AI to compare actual data flows against permitted and expected data flows. The post Orion Security Raises $6 Million to Tackle Insider Threats and Data Leaks with AI-Driven DLP appeared first on ...

HUMAN Security Applies AI to Combatting Malicious Bots

HUMAN Security this week revealed it is applying artificial intelligence (AI) and data modeling to bot management as part of an effort to provide cybersecurity teams more granular insights into the origins of cyberattacks. The post HUMAN Security ...

Most organizations change policies to reduce CISO liability risk

93% of organizations made policy changes over the preceding 12 months to address concerns about increased personal liability for CISOs, according to Fastly. This includes two in five organizations (41%) increasing CISO participation in strategic ...

Identity Attack Surface Management (IASM): The Convergence of Identity Security Frameworks

As cyber threats evolve, Identity Attack Surface Management (IASM) emerges as a critical approach that unifies existing security frameworks to protect digital identities. Discover how this convergence strengthens your security posture against ...

March Madness Requires Vigilance on Both an Individual and Corporate Level

Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program. The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first ...

GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD

4 min readLong-lived credentials and secrets fueled the attack. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD appeared first on Aembit. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity ...

DEF CON 32 – Recon Village – OWASP Amass: Expanding Data Horizons

Instructor: Jeff Foley Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

What’s Behind Google’s $32 Billion Wiz Acquisition?

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem? The post What’s Behind Google’s $32 Billion Wiz Acquisition? appeared first on SecurityWeek.

Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach

Infosys McCamish System has agreed to pay $17.5 million to settle six class action lawsuits filed over a 2023 data breach. The post Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach appeared first on SecurityWeek.

Kariyer.Net’te DevOps’tan DevSecOps’a Dönüşüm -2-Static Application Security Testing

Siber Güvenlik, günümüzde kurumların dijital varlıklarını ve iş süreçlerini korumak için temel ihtiyaç haline gelmiş kritik bir…Continue reading on Kariyer.net Tech »

Kariyer.Net’te DevOps’tan DevSecOps’a Dönüşüm -2-Static Application Security Testing

Siber Güvenlik, günümüzde kurumların dijital varlıklarını ve iş süreçlerini korumak için temel ihtiyaç haline gelmiş kritik bir…Continue reading on Medium »

Virtual Event Today: Supply Chain & Third-Party Risk Security Summit

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues. The post Virtual Event Today: Supply Chain & Third-Party Risk Security Summit appeared first on SecurityWeek.

Report: The State of Secrets Sprawl 2025

GitGuardian’s State of Secrets Sprawl 2025 report shows no progress in combating secrets sprawl, with 23.8 million secrets leaked on public GitHub repositories in 2024—a 25% year-over-year increase. Despite GitHub Push Protection’s efforts, ...