Application Security News and Articles


Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox, BioConnect, BitSight, BreachLock, Cisco, Commvault, Compliance Scorecard, DataDome, Hiya, IT-Harvest, ...

The Undercurrent Behind the Rise of DeepSeek: DDoS Attacks in the Global AI Technology Game

Background The rise of DeepSeek is undoubtedly a milestone in the development of AI technology in China. As a representative AI enterprise, DeepSeek has not only made breakthrough progress in technological innovation and commercial application, ...

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

  For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that system and service ...

Trump Administration Faces Security Balancing Act in Borderless Cyber Landscape

What challenges will the new administration face and what might President Trump’s record on cybersecurity indicate about the likely approach in 2025 and beyond? The post Trump Administration Faces Security Balancing Act in Borderless Cyber ...

2025 predictions: Security industry

The pace of change in the technology industry has never been faster, and 2025 will be no exception. As businesses adapt to new threats, regulatory pressures, and AI-driven innovations, security and software development teams will need to rethink ...

Preparing for PCI DSS 4.0: How Sonatype SBOM Manager can streamline and accelerate your transition

Payment Card Industry Data Security Standard (PCI DSS) was developed to strengthen payment account data security and standardize globally the necessary security controls. The transition from PCI DSS 3.2.1 and earlier versions to v4.0 involves ...

Advancing Cloud Compliance with Proactive Measures

How Can Proactive Measures Enhance Cloud Compliance? Advancements in digital security manifest as a double-edged sword. While they provide efficient tools to safeguard sensitive data, they concurrently create complex cybersecurity challenges. ...

Innovative PAM Strategies for Modern Enterprises

How Essential are Innovative PAM Strategies for Modern Enterprises? Where technology advances at an unprecedented rate, a question emerges for modern businesses: How pivotal are innovative Privileged Access Management (PAM) strategies for your ...

Trust in Cloud Security with Effective Secrets Rotation

How Critical is Secrets Rotation in Building Trust in Cloud Security? Are you aware that proper management of Non-Human Identities (NHIs) and Secrets is a cornerstone of robust cloud security? Indeed, incorporating effective secrets rotation in ...

Hiya AI Phone App Protects Against Deepfakes, Other Scams

Mobile security solutions company Hiya is rolling out its Hiya AI Phone app that uses trained AI models to smoke out deepfakes and other mobile scams and alerts the user to the potential threat. In addition, it will automatically transcribes and ...

Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise

The lawsuit said that the combination of businesses would eliminate competition, raise prices and reduce innovation. The post Justice Department Sues to Block $14 Billion Juniper Buyout by Hewlett Packard Enterprise appeared first on SecurityWeek.

DEF CON 32 – Color Blasted Badge Making: How Hard Could It Be

Authors/Presenters: Abhinav Panda, Bradán Lane Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

2025’s Top Five Trends in Identity Verification

Identity verification has emerged as a key component of modern enterprise security as rules tighten and cyber threats, increasingly powered by AI, grow in volume and effectiveness. Emerging technology, changing attack patterns, and new ...

Next Steps from the PCI Council’s SAQ-A Update: Critical Responsibilities and Opportunities for PSPs

by Source Defense The PCI Council’s recent update to SAQ-A merchant requirements will spark questions and confusion across the eCommerce ecosystem. Under the changes, SAQ-A merchants will no longer have to specifically follow requirements 6.4.3 ...

Assessing the New SAQ-A Changes: Insights for QSAs

by Source Defense The PCI Security Standards Council’s recent update to SAQ-A merchant eligibility and compliance requirements introduces significant changes with just weeks to go before the March 31st deadline for 6.4.3 and 11.6.1…shocker. ...

Cheat Sheet and Action Plan: The PCI Council’s SAQ-A Eligibility Update

by Source Defense Implications to 6.4.3 and 11.6.1 and What It Means for PSPs, Merchants, and QSAs. On January 30, 2025 the PCI Security Standards Council announced changes to eligibility requirements for any merchant trying to demonstrate ...

VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products

VMWare calls attention to patches for multiple 'high-risk' security defects in its Aria Operations and Aria Operations for Logs products. The post VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products appeared first on SecurityWeek.

Conifers.ai Scores $25M Investment for Agentic AI SOC Technology

Backed by SYN Ventures, Conifers.ai plans to use “agentic AI” technology to tackle complex security operations center (SOC) problems. The post Conifers.ai Scores $25M Investment for Agentic AI SOC Technology appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Humidifier Review’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Humidifier Review’ appeared first on Security Boulevard.

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI. The post Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to ...