Application Security News and Articles


Code Intelligence Spark automates software testing

Code Intelligence announced Spark, an AI test agent that autonomously identifies bugs in unknown code without human interaction. It’s the first AI Agent to find a real-world vulnerability by automatically generating and running a test for a ...

Escape vs Probely (acquired by Snyk)

Discover the differences between these tools for Application Discovery and DAST. The post Escape vs Probely (acquired by Snyk) appeared first on Security Boulevard.

Get real about container security: 4 essential practices to manage risk

The use of container technologies for software development and release has proliferated over the past year, heightening the need for organizations to implement updated security controls and processes to mitigate risk. The post Get real about ...

Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)

The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December 2024, Mandiant researchers have shared. It’s still impossible to say whether they were ...

Maintaining SOC 2 Compliance: A Strategic Approach for Businesses

Explore this blog to discover how a strategic approach can help your SaaS business maintain SOC 2 compliance effectively. The post Maintaining SOC 2 Compliance: A Strategic Approach for Businesses appeared first on Scytale. The post Maintaining ...

Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal

A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet's CISO is calling a "phish-free" ...

Wireshark 4.4.3 released: Updated protocol support, bug fixes

Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and offline analysis, and display filters. With multi-platform support, VoIP analysis, and capture ...

Top Cybersecurity Conferences & Events in India 2025 

The Indian cybersecurity ecosystem is experiencing significant growth, making it one of the fastest-growing and most important technology spaces globally. As cyber threats increase in scale and sophistication, it’s essential... The post Top ...

Top 10 Data Loss Prevention (DLP) Tools for 2025

DLP tools protect sensitive information from unauthorized access, sharing, or accidental loss. With the rise in data breaches and cyber threats, companies must safeguard their intellectual property, personally identifiable information (PII), and ...

BreachLock Unified Platform provides visibility into the organization’s attack surface

Eliminating the inefficiencies, silos, unnecessary complexity, and coverage gaps that security practitioners have faced with fragmented security tools, the newly unveiled BreachLock Unified Platform integrates findings from Penetration Testing as ...

The ongoing evolution of the CIS Critical Security Controls

For decades, the CIS Critical Security Controls (CIS Controls) have simplified enterprises’ efforts to strengthen their cybersecurity posture by prescribing prioritized security measures for defending against common cyber threats. In this ...

Synology ActiveProtect boosts enterprise data protection

Synology releases ActiveProtect, a new line of data protection appliances designed to provide enterprises a unified backup solution with simplicity, security and scalability. ActiveProtect integrates backup software, servers, and backup ...

GitLab CISO on proactive monitoring and metrics for DevSecOps success

In this Help Net Security interview, Josh Lemos, CISO at GitLab, talks about the shift from DevOps to DevSecOps, focusing on the complexity of building systems and integrating security tools. He shares tips for maintaining development speed, ...

Sara: Open-source RouterOS security inspector

Sara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular expressions as the primary analysis mechanism. This allows you to ...

Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd

As we look ahead to cybersecurity developments in 2025, there’s bad news and good—expect to see new challenging attacks and the cybersecurity community increasingly working together to counter threats that are beyond the scope of individual ...

Optimizing Cloud Security with Advanced Secrets Scanning

Why is Secrets Scanning Critical for Cloud Security? Have you ever considered how secrets scanning could be the vital ingredient your organization needs to optimize cloud security? As technology advances at a relentless pace, so do the threats ...

Mitigating Risks with Privileged Access Management

Why is Privileged Access Management Crucial for Risk Mitigation? Managing Non-Human Identities (NHIs) has become a central issue. The complex landscape of digital transformation is precipitating increased attention towards effective Privileged ...

What Makes You… You? A Philosophical Take on Non-Human Identity

6 min readFrom DNA to data, explore the unanswered questions of identity and the challenges of securing a non-human world. The post What Makes You… You? A Philosophical Take on Non-Human Identity appeared first on Aembit. The post What Makes ...

DEF CON 32 – Student Engagement Doesn’t Have to Suck

Author/Presenter: Dr. Muhsinah Morris Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed

The data of more than 8,500 customers were exposed during an attack on the Green Bay Packers online retail website in which the hackers were able to bypass security measure and install malicious code, steal customers' names, addresses, and credit ...