Application Security News and Articles
Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting user credentials. Trained by Dashlane on both legitimate and phishing sources, the new innovation ...
Kusari unveiled Kusari Inspector, an AI-based pull request security tool that brings cutting-edge security risk analysis directly into developers’ daily workflows. In Kusari Inspector, Kusari has brought together a powerful combination of ...
As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF, when utilized by the graduated CNCF Cilium and its sub-project Tetragon, combined with Software Bills of ...
This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability scanning, and cloud security. Autorize: Burp Suite extension for automatic ...
Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging AI to improve threat detection and response times and to build enhanced incident response capabilities. What’s changing AI ...
In Q1 2025, Cofense Intelligence identified a sophisticated phishing tactic combining long-lived domains, custom CAPTCHAs, and anti-automated analysis to bypass SEGs. This combination allows threat actors to evade detection by replacing malicious ...
In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to sensitive data and system functions. Drawing on Zimperium’s recent ...
Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according to GoTo. In fact, 62% believe AI has been significantly overhyped. However, this is ...
Why traditional SOC playbooks and AI agents fall short. Learn how Morpheus AI delivers autonomous security operations without the complexity.
The post Beyond Playbooks and AI Agents: Embracing Persistent, Autonomous Security Operations appeared ...
Last week at Microsoft Build, Azure CTO Mark Russinovich made headlines by telling the truth.
Related: A basis for AI optimism
In a rare moment of public candor from a Big Tech executive, Russinovich warned that current AI ...
There’s no room for guesswork in today’s data center operations. Modern IT environments demand tools that provide real-time insights, predictive analytics, and seamless integration to ensure uptime and efficiency. By leveraging cutting-edge ...
Today’s cybersecurity landscape is complex and unforgiving. Remote work, Saas, AI Agents, cloud migration, and ever-evolving cyber threats have exposed the limitations of relying on standalone security measures. To reduce risk, CISOs and IT ...
AI agents are no longer science experiments in the enterprise. They’re becoming actors in critical workflows—making decisions, performing transactions, and chaining together complex API calls across multi-cloud environments. Gartner calls ...
Are Your Cloud Secrets as Secure as They Could Be? You’d likely agree that secrets management, particularly for Non-Human Identities (NHIs), is a critical aspect of cybersecurity. But how safe are your secrets stored in the cloud? NHIs, a term ...
Are You Leveraging NHIDR Capabilities for Advanced Cybersecurity? Managing Non-Human Identities (NHIs) and Secrets Security is not only a critical factor but also a cornerstone. With cyber threats become increasingly sophisticated, isn’t it ...
How Secure is Your Cloud-Native Security? We can’t ignore the rising importance of non-human identities (NHIs) and Secrets Security Management in the field of cloud-native security. Defined by the unique interplay between “Secrets” and ...
Artificial intelligence is entering its agentic era—where AI systems don’t just assist humans, they act autonomously to accomplish complex tasks. These agents can reason, delegate, and interact with APIs and systems across clouds, all at ...
Researchers identify a previously unknown ClickFix variant exploiting PowerShell and clipboard hijacking to deliver the Lumma infostealer via a compromised travel site.
The post New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in ...
GitGuardian and GuidePoint Security have partnered to deliver enhanced secrets detection and non-human identity security solutions to North American customers, offering tools to combat secrets sprawl and mismanaged identities.
The post ...
Author/Presenter: Mariatta Wijaya (Python Core Developer)
Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb ...