Application Security News and Articles


Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners

The private equity firm will purchase the outstanding shares of Jamf common stock for $13 per share in an all-cash transaction. The post Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners appeared first on SecurityWeek.

Elevating the Human Factor in a Zero-Trust World

Zero-trust isn’t just technology — it’s a human-centered strategy. Real security depends on context, judgment and collaboration, not automation alone. The post Elevating the Human Factor in a Zero-Trust World appeared first on Security ...

Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks

The Windows shortcut vulnerability has been seen in attacks conducted by Mustang Panda to drop the PlugX malware. The post Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks appeared first on SecurityWeek.

ImmuniWeb Continuous now enables always-on, AI-powered security testing

ImmuniWeb has unveiled an upgraded version of ImmuniWeb Continuous, designed for continuous penetration testing and 24/7 automated vulnerability scanning of web applications, APIs, and microservices. The new solution is a perfect fit for ...

Japan Issues OT Security Guidance for Semiconductor Factories

The 130-page document covers several important aspects and it’s available in both Japanese and English. The post Japan Issues OT Security Guidance for Semiconductor Factories appeared first on SecurityWeek.

Shadow AI: New ideas emerge to tackle an old problem in new form

Shadow AI is the second-most prevalent form of shadow IT in corporate environments, 1Password’s latest annual report has revealed. Based on a survey of over 5,000 IT/security professionals and knowledge workers in the US, UK, Europe, Canada ...

AI chatbots are sliding toward a privacy crisis

AI chat tools are taking over offices, but at what cost to privacy? People often feel anonymous in chat interfaces and may share personal data without realizing the risks. Cybercriminals see the same opening, and it may only be a matter of time ...

IoT Security Challenges That Every Organization Should Be Aware Of

The widespread adoption of IoT technologies has greatly improved connectivity and convenience across industries, homes, and infrastructure. Yet, this growth has also brought a range of security challenges stemming from limited device resources, ...

You can’t audit how AI thinks, but you can audit what it does

In this Help Net Security interview, Wade Bicknell, Head, IT Security & Operations, CFA Institute, discusses how CISOs can use AI while maintaining security and governance. He explains why AI presents both defensive opportunities and ...

Passwordless adoption moves from hype to habit

With the average person juggling more than 300 credentials and credential abuse still the top attack vector, the password’s decline is long overdue. Across every major sector, organizations are changing how users log in, and new data shows the ...

The secret to audit success? Think like your auditor

In this Help Net Security video, Doug Kersten, CISO at Appfire, shares practical, experience-driven advice on how CISOs can avoid the most common mistakes when preparing for an audit. He breaks down what often frustrates auditors, why ...

Infosec products of the month: October 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Akeyless, Axoflow, Blumira, Cayosoft, Confluent, Corelight, Elastic, Illumio, Legit Security, Netscout, NowSecure, Nozomi Networks, Palo Alto ...

Flight Simulators for AI Agents — Practicing the Human-in-the-Loop

Simulators don’t just teach pilots how to fly the plane; they also teach judgment. When do you escalate? When do you hand off to air traffic control? When do you abort the mission? These are human decisions, trained under pressure, and just as ...

Building an AI Pilot’s License — From Sandbox Hours to Production Readiness

Pilots don’t just train in simulators; they log hours and earn licenses. A private pilot needs a minimum number of simulator sessions before solo flight. Commercial pilots need even more. The process is standardized, measurable, and ...

Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests

Enterprises adopting agentic AI face their own black swans. Identity outages, token replay attacks, or rogue agents don’t happen every day, but when they do, the impact is massive and immediate. The problem is that most organizations still rely ...

Secrets Management That Fits Your Budget

How Can Effective NHI Management Transform Your Cybersecurity Strategy? How can organizations efficiently manage secrets and non-human identities (NHIs) while maintaining a budget-friendly approach? This question is particularly vital for ...

Satisfied with Your Secrets Vaulting Approach?

Are You Really Satisfied with Your Secrets Vaulting Approach? How confident are you in your current secrets vaulting strategies? Where organizations increasingly rely on digital processes, the management of Non-Human Identities (NHIs) and their ...

Improving NHI Lifecycle Management Continuously

What is the True Cost of Overlooking Non-Human Identities? When organizations increasingly move operations to the cloud, the spotlight is now on securing machine identities, also known as Non-Human Identities (NHIs). But what happens when these ...

Independent Control Over Cloud Identities

How Secure Are Your Cloud-Based Non-Human Identities? What measures are you taking to ensure the security of your cloud-based systems? Managing Non-Human Identities (NHIs) has become a critical focus for diverse sectors, including financial ...

Responding to Breaches: How NSPM Accelerates Incident Containment

When a breach happens, seconds matter. Every moment between detection and containment gives an attacker time to move laterally, exfiltrate data, or escalate privileges. Yet, most organizations still rely on... The post Responding to Breaches: How ...