Application Security News and Articles


The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape

Attackers increasingly leverage AI-powered exploitation and can quickly identify vulnerable systems, infiltrate networks unnoticed and move laterally to compromise critical assets. The post The Future of Enterprise Security: AI-powered Lateral ...

CISO Global launches AI-driven cloud security solution

CISO Global launched of CISO Edge, its next-generation AI-driven cloud security solution, now available to existing customers and channel partners. Built to meet the growing demand for enterprise-grade cybersecurity, CISO Edge delivers ...

Top 10 Non-Human Identities Risks by OWASP

The Open Worldwide Application Security Project (OWASP) has just unveiled its Top 10 Non-Human Identities (NHI) Risks for 2025. While OWASP has long provided resources on application and API security, none have specifically addressed the unique ...

How financial institutions can minimize their attack surface

In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and ...

Hackers target AI and crypto as software supply chain risks grow

The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, ...

Cybersecurity jobs available right now: March 18, 2025

Application Security Expert monday.com | United Kingdom | Hybrid – View job details As an Application Security Expert, you will provide guidance on security best practices and compliance, and undertake security testing. Develop ...

Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS

Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS madhav Tue, 03/18/2025 - 04:20 Oracle and Thales are excited to announce CipherTrust Cloud Key Management’s (CCKM) support ...

UK NHS API Flaw Exposes Critical Mobile Security Risks

A recent vulnerability discovered in an UK National Health Service HS API has once again highlighted the risks associated with insecure mobile application programming interfaces (APIs). The flaw reportedly allowed unauthorized access to sensitive ...

SOAR vs SIEM: What’s the Difference?

The post SOAR vs SIEM: What’s the Difference? appeared first on AI Security Automation. The post SOAR vs SIEM: What’s the Difference? appeared first on Security Boulevard.

Ontic Named Frost and Sullivan’s Company of the Year for Revolutionizing Security Technology 

Learn how our commitment to innovation, excellence, and client success made this achievement possible The security industry is undergoing a profound transformation. The convergence of digital and physical threats, the overwhelming surge of data, ...

Celebrating Women in Cybersecurity for Women’s History Month

Roopa Makam, Prekshya Basnet, and Nicole Miller have forged unique paths in cybersecurity, shaping the industry with their expertise and perspectives. They share their career journeys, challenges, and insights on fostering inclusivity—from ...

News alert: Link11’s research shows DDoS attacks are more targeted — and doubled — year-over-year

Frankfurt, Germany, Mar. 17, 2025, CyberNewswire — Cyberattacks are no longer an abstract threat – they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS ...

Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response

Morpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. The post Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response ...

Hardware Hacking: Tools, Tips & Tricks for Total Domination

Join Paul Asadoorian for an eye-opening webinar exploring the meteoric growth of affordable hardware hacking devices, from the FlipperZero to ESP32-based platforms, and their implications for cybersecurity.  This session is a must for security ...

BSides Exeter 2024 – Red Track – OfCORS! How To Do Cross Origin Resource Sharing (im)properly

Author/Presenter: Cory Turner Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 ...

Fast Answers, Less Noise: Meet BX5, Our New AI Engine, and the Heavily Updated BIX

Cybersecurity can quickly spiral out of control. Dashboards pile up, alerts never stop buzzing, and vulnerabilities keep pouring in faster than teams can handle. That’s exactly why we built BX5, our latest AI engine, and enhanced our GenAI ...

CIAM Basics: A Comprehensive Guide to Customer Identity and Access Management in 2025

CIAM has evolved from a security tool into a business advantage. This comprehensive guide explores how CIAM solutions balance robust security with seamless user experiences, helping organizations build trust, enhance customer engagement, and ...

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek.

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on ...

Randall Munroe’s XKCD ‘Omniroll’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Omniroll’ appeared first on Security Boulevard.