Application Security News and Articles


The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your ...

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain ...

What You Don’t Log Will Hurt You – FireTail Blog

Aug 28, 2025 - Lina Romero - APIs have become the most targeted attack surface in enterprise environments, and AI (particularly agentic AI) is making it even harder to protect those critical connections. But one of the most often overlooked and ...

Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows

Get a firsthand look at how 400 security and IT leaders are tackling today’s cyber risk challenges in this latest study from Tenable and Enterprise Strategy Group. From budget allocation and prioritization methods to team structure, ...

FBI Issues Updated Warning on Salt Typhoon’s Global Cyber-Espionage Operations

The FBI has released new findings on a long-running cyber campaign that quietly infiltrated major U.S. telecommunications providers and critical infrastructure around the world. The campaign, carried out by a group of hackers linked to the ...

Can We Really Eliminate Human Error in Cybersecurity? 

Cybersecurity breaches often stem not from advanced exploits but from human error, misconfigurations, and routine mistakes. True resilience comes from designing systems that expect failure, leverage automation wisely, and foster a security-first ...

What’s the difference between CMC and VMC certification?

Common Mark Certificates (CMC) and Verified Mark Certificates (VMC) both enable brand logos in email inboxes via BIMI, boosting trust, security, and deliverability. The key difference? VMCs require trademark validation and show a blue checkmark ...

Why Traditional Zero-Trust Breaks Down with Agentic Identities

As AI agents become the new digital workforce, traditional zero-trust models fall short. Enterprises face an Access-Trust Gap that demands new runtime governance. Agentic Identity and Security Platforms (AISP) provide dynamic controls to secure ...

Cycuity Radix-ST identifies security weaknesses earlier in chip design

Cycuity introduces Radix-ST, a new product in its Radix portfolio of security solutions designed to leverage static analysis techniques to identify potential weaknesses early in the design cycle without requiring simulation or emulation. As ...

The Biggest Technology Risk to Organizations is Failing to Plan for Cybersecurity Chaos

Budget cuts at CISA highlight the urgent need for businesses to strengthen internal cybersecurity strategies. From mapping hybrid networks to embedding a security-first culture, organizations must proactively close the gap between chaos and ...

Beyond the Firewall: Rethinking Enterprise Security for the API-First Era

Evolve your enterprise security for the API-first era. Learn how to prioritize API security, implement SSO, MFA, and Passkeys, and foster a DevSecOps culture. The post Beyond the Firewall: Rethinking Enterprise Security for the API-First Era ...

Top 5 Cybersecurity Risks That Your Law Firm Can Face

One in five law firms isn't sure if they've been hacked. Don't be one of them. Learn the 5 cybersecurity risks that could shut down your practice and damage client trust forever. The post Top 5 Cybersecurity Risks That Your Law Firm Can Face ...

ScamAgent shows how AI could power the next wave of scam calls

Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the other end of the line, future calls could be run entirely by AI. ScamAgent system ...

Kill the Password: A Developer’s Guide to Passwordless Authentication Nirvana

A comprehensive guide for developers on implementing passwordless authentication. Explore various methods, improve security, and enhance user experience. Learn to kill the password! The post Kill the Password: A Developer’s Guide to ...

Where security, DevOps, and data science finally meet on AI strategy

AI infrastructure is expensive, complex, and often caught between competing priorities. On one side, security teams want strong isolation and boundaries. On the other, engineers push for performance, density, and cost savings. With GPUs in short ...

NSFOCUS was Included Among Representative Vendors in “The Cloud Native Application Protection Solutions Landscape”

Recently, Forrester released the 2025 “The Cloud Native Application Protection Solutions Landscape” report. NSFOCUS Cloud Native Application Protection Solution (hereinafter referred to as “NSFOCUS CNAPP”) has been selected among ...

NSA, FBI, Others Say Chinese Tech Firms are Aiding Salt Typhoon Attacks

A report from intelligence agencies in the U.S., UK, and elsewhere outlined how three Chinese tech firms are supply China's intelligence services with products and services that are being used in global campaigns by the state-sponsored APT group ...

Maritime cybersecurity is the iceberg no one sees coming

Maritime transport, the backbone of global trade, is adapting to shifting economic, political, and technological conditions. Advances in technology have improved efficiency, bringing innovations such as remote cargo monitoring, advanced energy ...

Can AI make threat intelligence easier? One platform thinks so

When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t sustainable. They were manually tracking blogs, RSS feeds, and social media channels, but it took too long to ...

How CISOs are balancing risk, pressure and board expectations

AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security risk, with many worried about sensitive data leaking through public tools. At the same time, most organizations are not blocking AI outright. Instead, ...