Application Security News and Articles


574 arrests, $3 million recovered in Africa-wide cybercrime crackdown

Law enforcement agencies across 19 countries arrested 574 suspects and recovered approximately $3 million during a major cybercrime operation spanning Africa. Suspects were arrested in Ghana in connection to the cyber-fraud case, with over 100 ...

10 Best Multi-Factor Authentication Solutions in 2026

Explore the 10 best MFA solutions in 2026. Compare features, pricing, pros, cons, and find the right multi-factor authentication tool for your business. The post 10 Best Multi-Factor Authentication Solutions in 2026 appeared first on Security ...

UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports

The British government is investigating a “cyber incident” following news reports that hackers linked to China have gained access to thousands of confidential documents. The post UK Government Acknowledges It Is Investigating Cyber Incident ...

15 Best Passwordless Authentication Solutions in 2026

Compare the 15 best passwordless authentication solutions for 2026. Explore features, pricing, use cases, and how to choose the right tool. The post 15 Best Passwordless Authentication Solutions in 2026 appeared first on Security Boulevard.

Building cyber talent through competition, residency, and real-world immersion

In this Help Net Security interview, Chrisma Jackson, Director of Cybersecurity & Mission Computing Center and CISO at Sandia National Laboratories, reflects on where the cyber talent pipeline breaks down and what it takes to fix it. She ...

Browser agents don’t always respect your privacy choices

Browser agents promise to handle online tasks without constant user input. They can shop, book reservations, and manage accounts by driving a web browser through an AI model. A new academic study warns that this convenience comes with privacy ...

9 MFA Mistakes in Manufacturing IT and Fixes

Discover the most common MFA mistakes in manufacturing IT and learn practical fixes to improve security, uptime, and authentication on factory floors. The post 9 MFA Mistakes in Manufacturing IT and Fixes appeared first on Security Boulevard.

Anubis: Open-source web AI firewall to protect from scraper bots

Anubis is an open-source tool designed to protect websites from automated scraping and abusive traffic by adding computational friction before a request is served. Maintained by TecharoHQ, the project targets a growing problem for site operators ...

Session tokens give attackers a shortcut around MFA

In this Help Net Security video, Simon Wijckmans, CEO at cside, discusses why session token theft is rising and why security teams miss it. He walks through how web applications rely on browsers to store session tokens after login often in ...

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, ...

NIST issues guidance on securing smart speakers

Smart home devices, such as voice-activated digital assistants, are increasingly used in home health care, with risks involved. An attacker could change a prescription, steal medical data, or connect a patient to an impostor. To reduce ...

Authentication Platform Comparison: Best Authentication Systems & Tools for Your Business

Compare leading authentication platforms like Okta, Auth0, and open-source tools. Find the best authentication system for your business needs, balancing security, cost, and scalability. The post Authentication Platform Comparison: Best ...

Handwritten Passwords for Touchscreen Devices

Explore handwritten passwords for touchscreen devices: a unique authentication method. Learn about security, usability, implementation, and how it compares to traditional passwords. The post Handwritten Passwords for Touchscreen Devices appeared ...

Future scope of Agentic AI in enhancing enterprise security

What Are Non-Human Identities (NHIs) and Why Do They Matter for Enterprise Security? Cybersecurity is continually shifting, with machine identities, or Non-Human Identities (NHIs), emerging as a crucial facet for robust security management. But ...

Can NHIs handle complex security requirements

Are Non-Human Identities the Key to Meeting Complex Security Requirements? Is your organization prepared to handle the intricate security challenges posed by the digital transformation? With digital expand, the utilization of Non-Human Identities ...

What makes Non-Human Identities safe in cloud environments

How Are Security Gaps in Cloud Environments Addressed? What methods can be employed to ensure the safety of Non-Human Identities (NHIs) in cloud environments? Managing NHIs forms the cornerstone of a robust security strategy. These machine ...

How does Agentic AI enhance operational security

What Role Does Agentic AI Play in Enhancing Operational Security? Are you confident that your organization’s operational security is fortified against the myriad of threats facing us today? With cybersecurity professionals delve deeper into the ...

NDSS 2025 – RACONTEUR: A Knowledgeable, Insightful, And Portable LLM-Powered Shell Command Explainer

Session 6D: Software Security: Vulnerability Detection Authors, Creators & Presenters: Jiangyi Deng (Zhejiang University), Xinfeng Li (Zhejiang University), Yanjiao Chen (Zhejiang University), Yijie Bai (Zhejiang University), Haiqin Weng ...

Android Security Update Triggers Renewed Attention with Mid-Month Changes

Google’s latest Android security updates are drawing renewed scrutiny this week as revisions, staggered patch rollouts, and follow-on fixes converge across the Android ecosystem. While the underlying security bulletin itself is not new, the way ...

​​Marquis Data Breach Exposes Hundreds of Thousands of Bank Customers

New regulatory disclosures have confirmed that a cyberattack on financial services vendor Marquis exposed sensitive personal and financial information belonging to more than 400,000 bank and credit union customers across the United States. ...