Application Security News and Articles


Are AI Firewalls Worth the Investment? 

AI-powered cyberattacks are rising fast, and AI firewalls offer predictive, adaptive defense—but their cost, complexity and ROI must be carefully justified as organizations weigh upgrades. The post Are AI Firewalls Worth the Investment?  ...

Heineken CISO champions a new risk mindset to unlock innovation

In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than technical overseers. She shares how connecting security to business impact can shift ...

Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec Teams 

AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding remains secure and compliant. The post Securing ...

Small language models step into the fight against phishing sites

Phishing sites keep rising, and security teams are searching for ways to sort suspicious pages at speed. A recent study explores whether small language models (SLMs) can scan raw HTML to catch these threats. The work reviews a range of model ...

Black Friday 2025 for InfoSec: How to spot real value and avoid the noise

Your inbox is probably drowning in Black Friday emails right now. Another “limited time offer” that’ll reappear next month, countdown timer creating artificial urgency. You’re right to be skeptical — most of it is noise. ...

How AI Threats Have Broken Strong Authentication 

A look at why identity security is failing in the age of deepfakes and AI-driven attacks, and how biometrics, MFA, PAD, and high-assurance verification must evolve to deliver true, phishing-resistant authentication. The post How AI Threats Have ...

What I’m Thankful for in DevSecOps This Year: Living Through Interesting Times

Alan reflects on a turbulent year in DevSecOps, highlighting the rise of AI-driven security, the maturing of hybrid work culture, the growing influence of platform engineering, and the incredible strength of the DevSecOps community — while ...

DeepTeam: Open-source LLM red teaming framework

Security teams are pushing large language models into products faster than they can test them, which makes any new red teaming method worth paying attention to. DeepTeam is an open-source framework built to probe these systems before they reach ...

How board members think about cyber risk and what CISOs should tell them

In this Help Net Security video, Jonathan Trull, EVP & CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two decades in the field, he explains how boards think about their duty to ...

Russian Hackers Target US Engineering Firm Because of Work Done for Ukrainian Sister City

The attack on the engineering firm was identified by Arctic Wolf in September before it could disrupt the engineering company’s operations or spread further. The post Russian Hackers Target US Engineering Firm Because of Work Done for Ukrainian ...

Secure by Design Principles

Explore Secure by Design principles for Enterprise SSO. Learn how to integrate security into your SSO architecture early for robust protection and compliance. The post Secure by Design Principles appeared first on Security Boulevard.

Understanding the Security of Passkeys

Explore the security of passkeys: how they work, their advantages over passwords, potential risks, and best practices for secure implementation in software development. The post Understanding the Security of Passkeys appeared first on Security ...

CVE-2025-50165: This Windows JPEG Vulnerability Proves Detection Isn’t Enough

The post CVE-2025-50165: This Windows JPEG Vulnerability Proves Detection Isn’t Enough appeared first on Votiro. The post CVE-2025-50165: This Windows JPEG Vulnerability Proves Detection Isn’t Enough appeared first on Security Boulevard.

How certain can I be of the security in NHIs?

Are Machine Identities as Secure as We Think? Where digital rapidly expanding across various sectors—from financial services to healthcare—organizations are compelled to assess the integrity of their security systems, specifically when it ...

What makes NHIs a powerful tool in cybersecurity?

Why Are Non-Human Identities Transformative in Cybersecurity? Have you ever considered how the management of machine identities could revolutionize cybersecurity across various sectors? Non-Human Identities (NHIs) are emerging as a crucial ...

Am I free to choose different Agentic AI frameworks?

Are Non-Human Identities the Key to Secure Cloud Environments? How do we ensure our systems remain secure, especially when it comes to machine identities and their secrets? The management of Non-Human Identities (NHIs) is a crucial aspect of ...

Is investing in advanced NHIs justified?

Why Are Non-Human Identities Essential for Modern Cybersecurity Strategies? Have organizations truly secured their cloud environments from lurking cyber threats? With the increasing reliance on technology, the management of Non-Human Identities ...

The Latest Shai-Hulud Malware is Faster and More Dangerous

A new iteration of the Shai-Hulud malware that ran through npm repositories in September is faster, more dangerous, and more destructive, creating huge numbers of malicious repositories, compromised scripts, and GitHub users attacked, creating ...

NDSS 2025 – Hidden And Lost Control: On Security Design Risks In loT User-Facing Matter Controller

Session4A: IoT Security Authors, Creators & Presenters: Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University ...

183 Million Credentials Misreported as a Gmail Breach

The 183M credentials came from infostealer logs. Learn why continuous password monitoring is essential for modern defense. The post 183 Million Credentials Misreported as a Gmail Breach appeared first on Security Boulevard.