Application Security News and Articles


Trusted Cloud Edge in Practice: Transforming Critical Industries

Part 3: Stealth Networking in Action – Real-World Deployment Scenarios Editor’s Note: In Part Two of this series, we explored why tunnel-free architectures are the foundation of the Trusted Cloud Edge. Now it’s time to move from theory to ...

Automatic Secrets Redaction at Runtime: Building a GitGuardian Lambda Extension

I'm going to show you how to build a Lambda Runtime API extension that automatically scans and redacts sensitive information from your function responses, without touching a single line of your existing function code. The post Automatic Secrets ...

Google Hack Redux: Should 2.5B Gmail Users PANIC Now?

Summer’s lease hath all too short a date: Let’s ask Ian Betteridge. The post Google Hack Redux: Should 2.5B Gmail Users PANIC Now? appeared first on Security Boulevard.

Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft breach

In the wake of last week’s revelation of a breach at Salesloft by a group tracked by Google as UNC6395, several companies – including Zscaler, Palo Alto Networks, PagerDuty, Tanium, and SpyCloud – have confirmed their Salesforce ...

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Part of a wave of DDoS attacks that lasted for weeks, the assault was a UDP flood mainly originating from Google Cloud. The post Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack appeared first on SecurityWeek.

AI Governance and Risk in Securing Software Supply Chains

Artificial intelligence (AI) is rapidly transforming software development, accelerating innovation, streamlining processes, and opening the door to entirely new capabilities. The post AI Governance and Risk in Securing Software Supply Chains ...

BSidesSF 2025: Radical Results: A Security Org’s Version Of Radical Candor

Creator, Author and Presenter: Evan Johnson Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Varonis Acquires Email Security Firm SlashNext

The transaction is valued up to $150 million, including performance-based retention awards, a Varonis spokesperson told SecurityWeek. The post Varonis Acquires Email Security Firm SlashNext appeared first on SecurityWeek.

Prevent MCP bypass

The Model Context Protocol (MCP) emerged as the answer to agent chaos. It's the structured way agents talk to each other and to your systems. But MCP only works if agents actually use it. And right now, nothing stops external agents from going ...

Varonis acquires AI email security provider SlashNext

Varonis Systems acquired SlashNext, an AI-native email security provider. Their predictive AI sees through evasive tactics, removes threats from the inbox, and protects from multi-channel phishing attacks. Hackers are flooding users with social ...

Distraction is the New Zero-Day: The Human Risk We Keep Ignoring

A few days ago, my friend Javvad Malik—a sharp voice in our industry and someone I trust—shared something that made me stop and think. Javvad, KnowBe4’s security awareness advocate, summed up the state of things beautifully: “Cyber ...

IT Service Management & Cybersecurity

In a recent podcast interview with Cybercrime Magazine host, Heather Engel, Cimcor President and CEO, Robert E. Johnson, III discuss how organizations are starting to move away from treating IT operations and cybersecurity as two separate areas ...

SentinelOne Gains Adoption Momentum Despite Macro Economic Headwinds

SentinelOne nears $1B ARR as Purple AI adoption grows and revenue surges 22% YoY, outpacing cybersecurity market growth amid rising AI-driven threats. The post SentinelOne Gains Adoption Momentum Despite Macro Economic Headwinds appeared first on ...

Patch Management vs Vulnerability Management: What’s the Difference?

Many organizations struggle with security gaps even after investing in different tools and processes. One of the most common reasons for breaches is the presence of unresolved weaknesses in systems.... The post Patch Management vs Vulnerability ...

Top CVEs & Vulnerabilities of August 2025- Risks, Impacts & Fixes

August 2025 saw critical CVEs surface, including high-impact flaws in WinRAR and Microsoft SharePoint. This blog highlights the most urgent vulnerabilities, their potential business risks, and the patch actions security teams should prioritize to ...

Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users

The Midnight Blizzard cyberspies used compromised websites to trick users into authorizing devices they controlled. The post Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users appeared first on SecurityWeek.

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users

The vulnerability (CVE-2025-55177) was exploited along an iOS/macOS zero-day in suspected spyware attacks. The post WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users appeared first on SecurityWeek.

1965 Cryptanalysis Training Workbook Released by the NSA

In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros D. Callimahos coined the term “Stethoscope” to describe a diagnostic computer program used to unravel the internal structure of pre-computer ...

The AI Vulnerability Crisis is Coming — Can Defenders Catch Up?

AI is becoming an autonomous exploit engine. Experts warn of an AI-driven vulnerability crisis — but resilience, alliances, and action can blunt the impact. The post The AI Vulnerability Crisis is Coming — Can Defenders Catch Up? appeared ...

NSFOCUS Recognized by Gartner® “Hype Cycle™ for APIs, 2025” for API Threat Protection

Recently, Gartner released “Hype Cycle for APIs, 2025”, NSFOCUS was selected as a Representative vendor in API Threat Protection of Hype Cycle with its cloud-native API security solution. We believe, this recognition reflects NSFOCUS’s ...