Application Security News and Articles


When IT fails, OT pays the price

State groups, criminal crews, and hybrid operators are all using familiar IT entry points to reach systems that support industrial processes, according to the latest Operational Technology Threat Report from Trellix. The report covers attacks ...

JWTs for AI Agents: Authenticating Non-Human Identities

how JWTs secure AI agents and autonomous systems. Explore best practices for authenticating non-human identities using modern OAuth and token flows. The post JWTs for AI Agents: Authenticating Non-Human Identities appeared first on Security ...

Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal

The move to acquire Chronosphere is the latest of several acquisitions in recent years and follows a massive $25 billion deal to acquire CyberArk. The post Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal ...

Palo Alto Networks to Acquire AI Observability Platform Chronosphere for $3.35 Billion

Palo Alto Networks Inc. announced Wednesday it will acquire Chronosphere, a next-generation observability platform designed for artificial intelligence (AI) workloads, in a $3.35 billion deal combining cash and replacement equity awards. The ...

Black Friday Fraud: The Hidden Threat in Mobile Commerce

Every year, Black Friday drives a surge of online purchases—but it also opens the floodgates for fraud. While most conversations focus on phishing emails or sketchy websites, the real cybersecurity frontline for e-commerce lies behind the ...

The Security Landscape of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of ...

News alert: CredShields and Checkmarx partner to extend AppSec into Web3 and smart contracts

SINGAPORE, Nov. 19, 2025, CyberNewswire — The collaboration advances enterprise grade application security into decentralized ecosystems, uniting Checkmarx’s AppSec expertise with Web3 specialization by CredShields. CredShields, a leading ...

Are impenetrable AI-driven security systems realistic

Can AI-Driven Security Systems Truly Be Impenetrable? When considering the complexities of modern cybersecurity, one question arises: can AI-driven security systems be genuinely impenetrable? The pursuit of robust digital protection is a constant ...

What makes AI-driven PAM solutions powerful

How Can AI-Driven PAM Improve Non-Human Identity Management? Is your organization struggling to effectively manage and secure non-human identities (NHIs) amid the complexities of cloud environments? The answer may lie in leveraging AI-driven ...

Is investing in advanced NHIDR systems justified

Are Your Cybersecurity Measures Overlooking Non-Human Identities? Have you ever considered the vast number of machine identities interacting with your company’s systems and the potential security risks they pose? Managing Non-Human Identities ...

How are modern PAM solutions delivering value

The Strategic Role of Non-Human Identities in Modern PAM Solutions What exactly bridges the gap between robust security measures and seamless cloud operations? The answer often lies in understanding the growing importance of Non-Human Identities ...

News alert: Secure.com debuts AI-native ‘Digital Security Teammate’ to help lean security teams

LOS ANGELES and DUBAI, United Arab Emirates, Nov. 18, 2025 – Secure.com today announced the launch of Digital Security Teammate (DST), a new category of AI-native agents built to help security teams survive the largest operational crisis the ...

APIs, Microservices and Risk Management – FireTail Blog

Nov 19, 2025 - Alan Fagan - Although microservices are widespread, they are often misunderstood by business leaders. While they present substantial benefits, they also have the potential to introduce new risks into the API environment. ...

API Security Essentials: A Comprehensive Checklist for Securing your API – FireTail Blog

Nov 19, 2025 - Alan Fagan - 1.  Validating User Input One of the cornerstones of API security is to validate user input. Failing to do so accurately can lead to a security issues such as injection attacks and Cross-Site Scripting. When users ...

NDSS 2025 – Understanding Miniapp Malware: Identification, Dissection, And Characterization

----------- SESSION Session 3C: Mobile Security ----------- ----------- Authors, Creators & Presenters: Yuqing Yang (The Ohio State University), Yue Zhang (Drexel University), Zhiqiang Lin (The Ohio State ...

FIRESIDE CHAT: Edge AI moves onto the silicon layer, redefining how connected systems run

One of the more surprising — and least visible — frontiers of artificial intelligence today is unfolding at the extreme edges of our hyper-connected systems. Related: AI adoption outpacing controls Think sensors in forests that detect illegal ...

Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes

Amazon threat intelligence experts have documented two cases in which Iran leveraged hacking to prepare for kinetic attacks. The post Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes appeared ...

Secure.com Raises $4.5 Million for Agentic Security

The cybersecurity company has launched Digital Security Teammate (DST), AI agents that investigate, triage, and escalate incidents when needed. The post Secure.com Raises $4.5 Million for Agentic Security appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘’Continents”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Continents” appeared first on Security Boulevard.

Beyond Pay-Per-Crawl: How to Turn AI Agent Traffic Into Revenue

Unlock new revenue streams from AI agents. Learn how DataDome + Skyfire’s KYA+Pay model turns verified agent traffic into secure, monetized interactions. The post Beyond Pay-Per-Crawl: How to Turn AI Agent Traffic Into Revenue appeared first on ...