Application Security News and Articles


Application Layer Attack Investigations in Minutes | Sumo Logic and Contrast Security

For a security analyst, the day begins and ends in the Sumo Logic Cloud SIEM. It’s the central hub for unifying security and observability data, designed to turn a firehose of enterprise-wide events into clear, actionable Insights. But the ...

Securing AI in SaaS: No New Playbook Required

Say yes to AI, no to risks. AppOmni’s AISPM solution overview breaks it down with smart discovery workflows and real-time threat detection. The post Securing AI in SaaS: No New Playbook Required appeared first on AppOmni. The post Securing AI ...

API Security Firm Wallarm Raises $55 Million

Wallarm has raised money in a Series C funding round led by Toba Capital, which brings the total raised by the company to over $70 million. The post API Security Firm Wallarm Raises $55 Million appeared first on SecurityWeek.

Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data 

LayerX has disclosed an AI chatbot hacking method via web browser extensions it has named ‘man-in-the-prompt’. The post Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  appeared first on SecurityWeek.

Seeing Your APIs Through an Attacker’s Eyes: Introducing Salt Surface

Your API attack surface is larger and more exposed than you realize. In today's complex, cloud-native environment, APIs are deployed at an astonishing rate. While this rapid pace fuels innovation, it also creates a significant visibility gap. ...

Inside Job: Attackers Are Spoofing Emails with M365’s Direct Send

Over the past three months, our threat analysts have noticed a significant spike in attackers abusing Microsoft 365’s Direct Send feature—a tool intended for devices like printers or scanners to send internal emails without authentication. ...

Intel 471 unveils Verity471, a unified platform for next-gen cyber threat intelligence

Intel 471 has launched Verity471, a next-generation cyber threat intelligence (CTI) platform. It brings together all of Intel 471’s solutions into one place, making it easier for security teams to work together, improve workflows, and get more ...

Outpost24 launches Credential Checker to spot leaked credentials on the dark web

Outpost24 has launched the Outpost24 Credential Checker, a free tool that provides organizations with a sneak peek into exposed credentials leaked on the dark web. Timely visibility into credential exposure can mean the difference between a ...

Debunking API Security Myths

I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most common API security myths. From zombie endpoints to the limits of WAFS and gateways, we covered what’s really ...

Cheating on Quantum Computing Benchmarks

Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the ...

Report Links Chinese Companies to Tools Used by State-Sponsored Hackers

SentinelLabs connects the dots between prolific Chinese state-sponsored hackers and companies developing intrusion tools. The post Report Links Chinese Companies to Tools Used by State-Sponsored Hackers appeared first on SecurityWeek.

EU Cyber Resilience Act: What You Must Do Before 2027

The European Union isn’t asking nicely anymore. With the Cyber Resilience Act, they’re laying down the law, literally, for how every company that makes or sells digital products in the... The post EU Cyber Resilience Act: What You Must Do ...

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes

Honeywell has patched several critical and high-severity vulnerabilities in its Experion PKS  industrial process control and automation product. The post Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes appeared first on ...

Google Project Zero Tackles Upstream Patch Gap With New Policy

Google Project Zero now publicly shares the discovery of a vulnerability and when its 90-day disclosure deadline expires. The post Google Project Zero Tackles Upstream Patch Gap With New Policy appeared first on SecurityWeek.

Smarter Protection, Faster Response: Discover What’s New in Our Cyberfraud Protection Platform

Explore the latest updates to DataDome’s Cyberfraud Protection Platform including sampled protection, real-time bot exposure insights, and flexible new response controls to deploy faster and stop threats sooner. The post Smarter Protection, ...

The Unbeatable Duo of EDR and Microsegmentation for Threat Containment

“If a breach happened today, how ready are you to contain it? How would you stop the spread? Can your business keep running while you respond?” Here’s the reality. So, we started helping enterprises move beyond just detecting an attack. ...

Singulr introduces AI control plane to replace fragmented tools with unified, automated governance

Singulr AI launched the unified AI control plane, a platform that empowers IT, security, and compliance leaders to scale AI adoption without compromising trust. Underpinning the platform are three key modules: the Singulr Pulse risk intelligence ...

Citrix delivers new tools for quantum-ready, anywhere work

Citrix has released two new offerings to help enterprises provide secure application access for their entire workforce amid an evolving threat landscape. The first is its post-quantum cryptography (PQC) solution for NetScaler which addresses the ...

Why stolen credentials remain cybercriminals’ tool of choice

It’s often the case that the simplest tools have the longest staying power, because they ultimately get the job done. Take duct tape, for example: it’s a sturdy household classic that wasn’t invented to be elegant or high tech. It was made ...

Palo Alto Networks to acquire CyberArk in $25 billion deal

Palo Alto Networks and CyberArk announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the agreement, CyberArk shareholders will receive $45.00 in cash and 2.2005 ...