Application Security News and Articles


Synack unveils Sara Pentest to accelerate scalable AI-driven penetration testing

Synack has announced Sara Pentest, a new agentic AI product built on the Synack Autonomous Red Agent (Sara) architecture. Sara Pentest performs penetration testing on hosts and web applications, speeding up vulnerability detection and remediation ...

Why Context Matters More Than Code in AI-Native Product Development

AI has changed how software gets built. For years, engineering teams treated code as the scarce resource. Writing it took time. Editing it took effort....Read More The post Why Context Matters More Than Code in AI-Native Product Development ...

DoorDash Says Personal Information Stolen in Data Breach

Names, addresses, email addresses, and phone numbers were compromised after an employee fell for a social engineering attack. The post DoorDash Says Personal Information Stolen in Data Breach appeared first on SecurityWeek.

Five men admit helping North Korean IT workers infiltrate US companies

US federal prosecutors have secured guilty pleas from five men who helped North Korean IT workers get hired by companies in the United States. This group of domestic facilitators helped a sanctioned government move money, slip past hiring checks, ...

The internet isn’t free: Shutdowns, surveillance and algorithmic risks

Global internet freedom has declined for the 15th straight year, according to the latest Freedom House report. Out of 72 countries evaluated, 28 recorded declines and 17 saw improvements. Shutdowns hit high-stakes zones The report documents ...

5 Plead Guilty in US to Helping North Korean IT Workers

Audricus Phagnasay, Jason Salazar, Alexander Paul Travis, Erick Ntekereze, and Oleksandr Didenko have pleaded guilty. The post 5 Plead Guilty in US to Helping North Korean IT Workers appeared first on SecurityWeek.

Cybersecurity Findings Management: What You Need to Know

What is Cybersecurity Findings Management? Cybersecurity findings management is the process of identifying, prioritizing, tracking, and remediating security issues uncovered through vulnerability scans, audits, or assessments. The post ...

From Compromise to Control: An MSP Guide to Account Takeovers

ATOs are the new BEC. We're seeing it on our end and other companies have certainly taken notice. Attackers compromised 6.2 million customer accounts across 1,027 large organizations in 2024 according to Kasada’s 2025 Account Takeover Attack ...

Logitech Confirms Data Breach Following Designation as Oracle Hack Victim

Logitech was listed on the Cl0p ransomware leak website in early November, but its disclosure does not mention Oracle. The post Logitech Confirms Data Breach Following Designation as Oracle Hack Victim appeared first on SecurityWeek.

Widespread Exploitation of XWiki Vulnerability Observed

The exploitation of the recent XWiki vulnerability has expanded to botnets, cryptocurrency miners, scanners, and custom tools. The post Widespread Exploitation of XWiki Vulnerability Observed appeared first on SecurityWeek.

Fixing Vulnerabilities Directly in your IDE with Escape MCP

Discover a step-by-step workflow you can plug directly into your development process The post Fixing Vulnerabilities Directly in your IDE with Escape MCP appeared first on Security Boulevard.

JWT Governance for SOC 2, ISO 27001, and GDPR — A Complete Guide

how proper JWT governance helps your organization stay compliant with SOC 2, ISO 27001, and GDPR. Explore best practices, governance frameworks, and how SSOJet ensures secure token management. The post JWT Governance for SOC 2, ISO 27001, and ...

The tech that turns supply chains from brittle to unbreakable

In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusses how organizations can strengthen supply chain resilience through a more unified and forward-looking strategy. Kelian also shares how new technologies ...

Strix: Open-source AI agents for penetration testing

Security teams know that application flaws tend to show up at the worst time. Strix presents itself as an open source way to catch them earlier by using autonomous agents that behave like human attackers. These agents run code, explore an ...

Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts

Do you spend countless hours tracking vulnerabilities in order to keep your software secure? Are you looking for a service to make your job easier by providing relevant, actionable vulnerability alerts? SecAlerts does just that. It saves you ...

The year ahead in cyber: What’s next for cybersecurity in 2026

In this Help Net Security video, Dick O’Brien, Principal Intelligence Analyst at Symantec, outlines the major cyber risks expected in 2026. He explains that attackers are often breaching networks by targeting people instead of exploiting ...

Building a Unified SAST + DAST Security Pipeline (Our Next Step in DevSecOps)

Rajesh Thakur | DevOps Engineer @ Deploycrafts |Continue reading on DevOps.dev »

The next tech divide is written in AI diffusion

AI is spreading faster than any major technology in history, according to a Microsoft report. More than 1.2 billion people have used an AI tool within three years of the first mainstream releases. The growth is fast, but it puts uneven pressure ...

OWASP Top 10 for 2025: What’s New and Why It Matters

In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application security. Learn about the ...

NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator

Incident Summary On October 21, 2025, NSFOCUS Cloud DDoS Protection Service (Cloud DPS) detected and mitigated an 800G+ DDoS attack towards a critical infrastructure operator. The target network sustained a multi-vector volumetric DDoS attack ...