Application Security News and Articles


Recent SAP S/4HANA Vulnerability Exploited in Attacks

A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild. The post Recent SAP S/4HANA Vulnerability Exploited in Attacks appeared first on SecurityWeek.

Behind the Salesforce OAuth Drift Breach

In recent weeks, major companies like Palo Alto Networks, Zscaler, Cloudflare, and SpyCloud have all confirmed they were affected by a string of cyberattacks that began with Salesforce. Or at least, that is how the headlines read. This is not a ...

Identifying the Best Vulnerability Management Software

Find the best vulnerability management software for your enterprise. Evaluate key features, integration with SSO & CIAM, and top solutions to protect your systems. The post Identifying the Best Vulnerability Management Software appeared first ...

September 2025 Patch Tuesday forecast: The CVE matrix

We work in an industry driven by Common Vulnerabilities and Exposures (CVE). Each security update released by myriad vendors addresses some flaw in software that could be exploited and those flaws that are publicly acknowledged are assigned a CVE ...

Data Resilience Reality Check: Why Most Organizations are Failing Their Own Audits 

Most firms fall short on data resilience. Learn how to close the gaps & turn resilience into a growth advantage. The post Data Resilience Reality Check: Why Most Organizations are Failing Their Own Audits  appeared first on Security Boulevard.

Authentication Policies for Passwordless Systems

Explore how to create effective authentication policies for passwordless systems. Learn to balance security and user experience with biometrics and FIDO2 keys. The post Authentication Policies for Passwordless Systems appeared first on Security ...

How to reclaim control over your online shopping data

Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping data goes Retailers often store ...

File security risks rise as insiders, malware, and AI challenges converge

Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with financial losses stretching into the millions. The fallout often includes ...

Smart ways CISOs can do more with less

In this Help Net Security video, Jill Knesek, CISO at BlackLine, shares practical strategies for CISOs navigating tighter budgets. From maximizing existing tools and vendor partnerships to leveraging AI and making smart investments, she offers ...

Connected cars are smart, convenient, and open to cyberattacks

Consumers are concerned about vulnerabilities in their vehicles, which directly impacts purchasing behavior and brand loyalty, according to RunSafe Security. Vehicles now run on over 100 million lines of code, which is more than most fighter ...

Accelerated Polling

Product Update: Version 5.1 This release is all about helping you move faster, see more, and manage your infrastructure with greater ease. From real-time polling and smarter layout tools to expanded support for DC power and new visual ...

Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System

In response to the CISA Advisory (AA25-239A), AttackIQ has updated the assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the Chinese adversary Salt Typhoon and released a new ...

Empower Your Team with Better Secrets Management

How Essential is Effective Secrets Management in Today’s Cybersecurity Landscape? The management of Non-Human Identities (NHIs) and their secrets has become an increasingly important consideration. It comes as no surprise that many ...

Innovations in Managing Non-Human Identities

Why is NHI Management Crucial in Today’s Expanding Digital Landscape? Have you ever considered how the rise in online and interconnected industries could be putting your company’s systems at risk? Where rapid technological advancements ...

Airline Disruption Recovery — How Agentic Identity Keeps Travel on Track

When flights get delayed, passengers want answers fast: rebooking, hotel vouchers, refund options. Human agents can’t scale to meet this surge, but AI agents can. The challenge? Identity. The post Airline Disruption Recovery — How Agentic ...

RetailThe AI Shopping Concierge — How Retailers Can Safely Orchestrate Identity Across Agentic Workflows

Retail is moving fast into agentic AI. Imagine a shopping concierge agent that compares prices, applies loyalty discounts, and completes a purchase for you — all in seconds. This sounds like a dream for customers, but for retailers, it’s a ...

How Financial Services Can Use Agentic Identity to Stop Fraud and Streamline Loan Approvals

In financial services, every transaction is built on trust. When an AI agent acts on behalf of a customer — checking credit scores, verifying KYC documents, or submitting a loan application — identity is the control plane. Without it, the ...

BSidesSF 2025: The Power Of Persuasion: Better Security Through… Manipulation?

Creator, Author and Presenter: Nate Lee Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Enhancing Splunk Support for Workloads

2 min readThis integration brings workload identity and access data into Splunk, giving security teams clearer visibility, faster response, and stronger zero trust controls. The post Enhancing Splunk Support for Workloads appeared first on ...

CimTrak Enabling Comply-2-Connect & Continuous Compliance for Zscaler

As federal agencies accelerate Zero Trust adoption, maintaining system integrity and meeting mandates like Comply-to-Connect (C2C) is more critical than ever.  This recent webinar focuses on how combining Zscaler’s Zero Trust Exchange with ...