Application Security News and Articles


SAP Zero-Day Possibly Exploited by Initial Access Broker

A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications. The post SAP Zero-Day Possibly Exploited by Initial Access Broker appeared first on SecurityWeek.

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others). Two of the flaws – CVE-2025-25184 and CVE-2025-27111 – could ...

All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack

A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs. The post All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack appeared first on ...

How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape

Discover how implementing Escape x Wiz integration helped the DoubleVerify AppSec team achieve full API visibility and accelerate targeted remediation. The post How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape ...

5 Reasons Organization Should Opt for Web App Pentest

The world that feeds us is digital, and web applications are the backbone of many organizations. Be it e-commerce, healthcare, BFSI, or any other industry, web apps store and process sensitive data on a daily basis. As the saying goes, ‘With ...

RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto ...

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, ...

Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data 

As cloud environments become more complex, ensuring robust security for your cloud infrastructure is no longer an option, but a necessity.  The post Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data  appeared ...

Detectify Asset Classification and Scan Recommendations improves vulnerability testing

Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new ...

Rubrik Identity Resilience protects vulnerable authentication infrastructure

Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) ...

BreachLock AEV simulates Real attacks to validate and prioritize exposures

BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure ...

Dashlane introduces Omnix for AI-powered credential protection

Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is ...

LastPass Secure Access Experiences simplifies access management

As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access ...

RSAC 2025 Innovation Sandbox | Knostic: Reshaping the Access Control Paradigm for Enterprise AI Security

Introduction As generative artificial intelligence (GenAI) and large language models (LLM) rapidly penetrate corporate operations, data leakage and privacy risks have become major challenges faced by enterprises. Knostic, a startup founded in ...

Vanta AI Security Assessment evaluates AI risk

Vanta announced new ways to help organizations demonstrate AI security and evaluate AI risk across their ecosystem. With the launch of Vanta’s new AI Security Assessment offering, customers using, developing or building with AI can now more ...

Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing

Vulnerabilities: It's not their presence but their visibility and controlled management that defines secure development. The post Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing appeared first on Security ...

Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia

Stay updated with the latest in Java! Discover key updates from OpenJDK, Spring Framework, and AWS, plus critical news affecting the community. The post Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia appeared first on ...

Flexible working models fuel surge in device theft

76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of ...

Exposure validation emerges as critical cyber defense component

Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to ...

13 core principles to strengthen AI cybersecurity

The new ETSI TS 104 223 specification for securing AI provides reliable and actionable cybersecurity guidance aimed at protecting end users. Adopting a whole-lifecycle approach, the framework outlines 13 core principles that expand into 72 ...