Application Security News and Articles


Navigating the API Security Landscape: Progress and Persistent Challenges in 2025

API adoption has become a critical driver of digital transformation, fueling cloud migration, seamless integrations, and the monetization of data and functionality. This rapid expansion, however, has inadvertently created increasingly complex ...

New ‘Auto-Color’ Linux Malware Targets North America, Asia

New Linux malware named Auto-Color, which allows full remote access to compromised devices, targets North America and Asia. The post New ‘Auto-Color’ Linux Malware Targets North America, Asia appeared first on SecurityWeek.

Virtual Event Today: Ransomware Resilience & Recovery Summit

SecurityWeek's 2025 Ransomware Resilience & Recovery Summit takes place today, February 26th, as a fully immersive virtual event. The post Virtual Event Today: Ransomware Resilience & Recovery Summit appeared first on SecurityWeek.

Biggest Challenges in Developing Fintech Apps & How to Overcome Them

The fintech industry has revolutionized the way we manage money, invest, and conduct financial transactions. With the rise of digital banking, mobile wallets, and investment...Read More The post Biggest Challenges in Developing Fintech Apps & ...

Integrating the Human Element in Your Cyber Risk Management Approach 

Cyber risk management is evolving, placing greater emphasis on collaboration and the critical role of human interaction. Experts in the field are advocating for a more people-centric approach, acknowledging the diverse backgrounds and ...

OpenSSF Releases Security Baseline for Open Source Projects

The Open Source Security Foundation (OpenSSF) has created a structured set of security requirements for open source projects. The post OpenSSF Releases Security Baseline for Open Source Projects appeared first on SecurityWeek.

Qualcomm Extends Security Support for Android Devices to 8 Years

Qualcomm says it’s working with Google to ensure that Android device manufacturers will be able to provide security updates for 8 years. The post Qualcomm Extends Security Support for Android Devices to 8 Years appeared first on SecurityWeek.

Hundreds of GitHub repos served up malware for years

Kaspersky researchers have unearthed an extensive and long-running malware delivery campaign that exploited users’ propensity for downloading code from GitHub and using it without first verifying whether it’s malicious. “Over ...

3.3 Million People Impacted by DISA Data Breach

Background and drug screening giant DISA has revealed that a 2024 data breach impacts more than 3.3 million people. The post 3.3 Million People Impacted by DISA Data Breach appeared first on SecurityWeek.

Pentera Cyber Pulse identifies new threats and vulnerabilities

Pentera has unveiled Cyber Pulse, a new mechanism to update the Pentera platform with the latest vulnerabilities and attack techniques from the Pentera research team. Cyber Pulse delivers a continuous stream of new cyber exposure validation ...

Red Hat OpenShift 4.18 enhances security across IT environments

Red Hat announced Red Hat OpenShift 4.18, the latest version of the hybrid cloud application platform powered by Kubernetes. Red Hat OpenShift 4.18 introduces new features and capabilities designed to streamline operations and security across IT ...

It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind   

The Cybersecurity Maturity Model Certification (CMMC) process is just around the corner and is expected by most to go into effect early next year. This is why defense tech companies need to act today to start their compliance journey. The post ...

Seal OS fixes vulnerabilities in Linux operating systems

Seal Security launched Seal OS, a solution designed to automatically fix vulnerabilities in both Linux operating systems and application code. Seal OS delivers long-term support for a wide range of Linux distributions, encompassing Red Hat ...

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must

The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks in ...

The compliance illusion: Why your company might be at risk despite passing audits

For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they don’t automatically equate to strong cybersecurity. The challenge? ...

Job Application Spear Phishing

Starting in Q3 2024, Cofense Intelligence detected an ongoing campaign targeting employees working in social media and marketing positions. In this campaign, marked employees were encouraged to apply to a social media manager position in a ...

Dalfox: Open-source XSS scanner

DalFox is an open-source tool for automating the detection of XSS vulnerabilities. With powerful testing capabilities and a wide range of features, it makes scanning, analyzing parameters, and verifying vulnerabilities faster and easier. ...

How enterprise leaders can secure and govern agentic AI

In this Help Net Security video, Nataraj Nagaratnam, an IBM Fellow and CTO for Cloud Security, discusses enterprises’ steps to lay a secure foundation for agentic AI deployments. Recent research from IBM and Morning Consult shows that 99% ...

Are Your Cloud Secrets Truly Protected?

How Secure Are Your Cloud Secrets? Is your organization truly protecting its cloud secrets, or are there gaps that might be exploited by malicious cyber actors? Non-Human Identities (NHIs) and Secrets Security Management is emerging as an ...

Harnessing Innovation for Better NHIs?

Are We Ready to Embrace NHI Innovation? Cybersecurity within various industry verticals has witnessed remarkable transformations due to rapid advancements in technology. But, amidst all the buzz, have we been successful in fully embracing the NHI ...