Application Security News and Articles


How Imperva Infused AI Throughout Research and Development

The Age of AI Is Upon Us The current pace of technological change beggars’ belief. Generative Artificial Intelligence (GenAI), released to the world a mere two years ago, promises to eliminate much of the tedium of the digital world. Software ...

Sophos Completes Acquisition of Secureworks

Sophos has completed its $859 million all-cash acquisition of SecureWorks. The post Sophos Completes Acquisition of Secureworks appeared first on SecurityWeek.

Secure by Design and Secure by Default: Why you need both for AppSec

The relationship between the two software security initiatives promoted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) can be misunderstood. Sometimes Secure by Design and Secure by Default are even pitted against each other. ...

DEF CON 32 – Hacker Vs. AI Perspectives From An Ex-Spy

Author/Presenter: Harriet Farlow Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip

Explore how the Cyberhaven attack exposes the dangers of 'consent phishing', a tactic that bypasses even robust security measures like MFA. The post Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Stromatolites’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Stromatolites’ appeared first on Security Boulevard.

Survey Sees Organizations Being Overwhelmed by Remediation Challenges

A survey of 150 security decision makers in the U.S., published today, finds that close to two thirds of cybersecurity incidents (62%) involved issues that were previously known to be a potential threat. Conducted by ZEST Security, the survey ...

Anomalies are not Enough

Mitre Att&ck as Context Introduction: A common theme of science fiction authors, and these days policymakers and think tanks, is how will the humans work with the machines, as the machines begin to surpass us across many dimensions. In ...

Exploitation of Over 700 Vulnerabilities Came to Light in 2024

The number of vulnerabilities first reported as exploited surged last year amid a decrease in zero-day reports. The post Exploitation of Over 700 Vulnerabilities Came to Light in 2024 appeared first on SecurityWeek.

Why Every Enterprise Needs a Cybersecurity System of Record

In today’s thoroughly digital world, technology decisions are business decisions, with cybersecurity standing out as a crucial area where this dynamic unfolds. It’s no longer just a box for IT Read More The post Why Every Enterprise Needs a ...

Why Traditional CRQ Falls Short — and How Modern Solutions Fill the Gaps

In a world in which cyberattacks have become both more frequent and costly, organizations are under growing pressure to manage digital threats more effectively. Cyber Risk Quantification (CRQ), a means Read More The post Why Traditional CRQ Falls ...

Why CRQ Methodologies Should Be Usable, Defensible, and Informative

In a thoroughly digital world, cyber incidents can have a huge financial impact, with the average cost of a data breach skyrocketing to $4.88 million. Still, too many businesses struggle Read More The post Why CRQ Methodologies Should Be Usable, ...

CISO Forum Webinar: Defenders on the Frontline – Incident Response and Threat Intel Under the Microscope 

Join this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. The post CISO Forum Webinar: Defenders on the Frontline – Incident Response and ...

22 New Mac Malware Families Seen in 2024

Nearly two dozen new macOS malware families were observed in 2024, including stealers, backdoors, downloaders and ransomware.  The post 22 New Mac Malware Families Seen in 2024 appeared first on SecurityWeek.

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech

This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...

How bots and fraudsters exploit free tiers in AI SaaS

The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several companies, such as OpenAI (ChatGPT) and Claude provide services, often in the form of software as a ...

When Stalking Looks Like Affection, Admiration, or Anger — The Challenge for EP Teams

How to strengthen your executive protection program to address and mitigate the impacts of stalking aimed at executives A customer becomes obsessed with an executive due to their relatable social media presence and desperately wants their ...

DEF CON 32 – D0N0H4RM Cyber STEM Storytime

Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Top 15 Cloud Compliance Tools in 2025

Explore the top 15 cloud compliance tools in 2025 that you can leverage to protect your organization and customer data. The post Top 15 Cloud Compliance Tools in 2025 appeared first on Scytale. The post Top 15 Cloud Compliance Tools in 2025 ...

Cycode Change Impact Analysis boosts application security posture

Cycode unveiled Change Impact Analysis (CIA) technology, a key addition to its Complete ASPM platform. This solution empowers organizations to proactively assess the security impact of every code change, enabling them to identify, prioritize, and ...