Application Security News and Articles


How nations build and defend their cyberspace capabilities

In this Help Net Security interview, Dr. Bernhards Blumbergs, Lead Cyber Security Expert at CERT.LV, discusses how cyberspace has become an integral part of national and military operations. He explains how countries develop capabilities to act ...

Zscaler acquires SPLX to help organizations secure their AI investments

Zscaler has acquired AI security pioneer SPLX, extending the Zscaler Zero Trust Exchange platform with shift-left AI asset discovery, automated red teaming, and governance, so organizations can secure their AI investments from development through ...

Graylog’s AI features improve security outcomes across hybrid environments

Graylog launched its Graylog Security Fall 2025 release. The latest version introduces AI-driven insights, Model Context Protocol (MCP) Server Access, and Amazon Security Data Lake integration, enabling SOCs to operate with clarity, speed, and ...

NSE System Audit – What is it and Who Needs It?

System Audit is a mandatory technical and compliance assessment introduced by SEBI and implemented by the National Stock Exchange (NSE). Its primary purpose is to ensure that every trading member or broker operates secure, reliable, and compliant ...

Cisco’s platform enhancements strengthen security for MSPs

Cisco announced a significant platform advancement designed to empower MSPs to deliver security services. This innovation adds foundational multi-customer management capabilities within Security Cloud Control, Cisco’s unified, AI-powered ...

Uncovering the risks of unmanaged identities

Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These unmanaged identities quietly expand your ...

Cybercriminals have built a business on YouTube’s blind spots

The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment, information, and deception coexist. Alongside everyday videos, the site has seen ...

Deepfakes, fraud, and the fight for trust online

In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity verification. He describes how fake IDs and synthetic identities are being used for account signups and ...

Financial services can’t shake security debt

In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that keeps growing, according to Veracode’s 2025 State of ...

Cybersecurity jobs available right now: November 4, 2025

Cybersecurity Architect Alstom | France | On-site – View job details As a Cybersecurity Architect, you will analyze solutions, identify associated risks, and propose security architecture models by involving various cybersecurity ...

MY TAKE: From AOL-Time Warner to OpenAI-Amazon — is the next tech bubble already inflating?

Anyone remember the dot-com bubble burst? The early warning came in January 2000, when AOL and Time Warner joined forces in a $164 billion deal — the largest merger in U.S. history at the time. Related: Reuters’ backstory on Amazon … ...

Stytch Alternatives for Passwordless Authentication

Compare the best Stytch alternatives for passwordless authentication after the Twilio acquisition. Developer-first analysis of MojoAuth, SSOJet, Auth0, WorkOS, Supabase Auth and Clerk — features, pricing and integration insights. The post ...

NSFOCUS in SAS 2025: Unveiling Secrets Behind Large-Scale DDoS Attacks on AI Platform and Social Media

SANTA CLARA, Calif., November 4, 2025 – The 18th Global Security Analyst Summit (SAS) concluded successfully in Khao Lak, Thailand. Focused on the complexity of APT attacks, the summit exposed the latest attack activities from Hacking Team ...

Scaling Your Security with NHIs: Key Insights

How Are Non-Human Identities Redefining Cybersecurity? Where cyber threats continue to evolve and multiply, how can organizations effectively safeguard their digital assets? The answer lies in the emerging focus on Non-Human Identities (NHIs). ...

Empowering Teams with Robust NHI Management

How Can Robust NHI Management Transform Your Cybersecurity Strategy? How non-human identities (NHI) can strengthen your organization’s cybersecurity framework? Efficiently managing NHIs is pivotal for seamless security operations. While human ...

Innovating Cyber Defense with Enhanced NHIDR

How Does Managing Non-Human Identities Revolutionize Cyber Defense? How can organizations enhance their defenses while managing the myriad of machine identities that populate their networks? The answer lies in Non-Human Identities (NHIs), which ...

Defense in Depth for AI: The MCP Security Architecture You’re Missing

As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern ...

Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist

Synthetic identity theft — where criminals combine real and fabricated data to create entirely new “people” — is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, ...

NDSS 2025 – VulShield: Protecting Vulnerable Code Before Deploying Patches

SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Yuan Li (Zhongguancun Laboratory & Tsinghua University), Chao Zhang (Tsinghua University & JCSS & Zhongguancun Laboratory), Jinhao Zhu (UC Berkeley), ...

How Ransomware Attacks Leverage Cyber Insurance Policies

Ransomware attacks continue to evolve into sophisticated strategic and psychological operations. Threat actors are always seeking ways to maximize their illicit gains, and they’ve now discovered a powerful piece to leverage: a ...