Application Security News and Articles


Cynomi Raises $37 Million Series B to Expand Its vCISO Platform

Cynomi announced a new $37 million Series B funding to grow its AI-powered vCISO platform for MSPs and MSSPs. The post Cynomi Raises $37 Million Series B to Expand Its vCISO Platform appeared first on SecurityWeek.

AirSwap $sAST: A Smart Way to Maximize Earnings

Efficient Techniques to Earn More with AirSwap $sASTContinue reading on Medium »

Crypto Success: Using AirSwap to Your Advantage

A step-by-step guide to earning more with AirSwapContinue reading on Medium »

Qualys Adds Tool to Automate Audit Workflows

Qualys this week added a tool that makes it possible for organizations to continuously run audits in a way that promises to dramatically reduce failure rates. The post Qualys Adds Tool to Automate Audit Workflows appeared first on Security Boulevard.

Browser Security Firm SquareX Raises $20 Million

SquareX offers what it has dubbed a “Browser Detection and Response (BDR)” solution. The post Browser Security Firm SquareX Raises $20 Million appeared first on SecurityWeek.

Anton’s Security Blog Quarterly Q1 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Dall-E security blogging image Top ...

Innovations in Non-Human Identity Management

Is Your Enterprise Leveraging NHI Management Innovations? Every organization operating in our interconnected digital era must adopt modern cybersecurity measures to safeguard their data and systems. But how many are aware of the critical role ...

Are You Free from Secrets Sprawl Worry?

Is your organization truly secure against Secrets sprawl? Cloud-based firms face a growing wave of identity and secrets security challenges. Among these, the phenomenon of Secrets sprawl threatens to jeopardize the integrity of data and IT ...

Satisfied with Your Secrets Management?

Are You Fully Satisfied with Your Current Secrets Management? How often do you question the effectiveness of your secrets management processes? It’s paramount to ensure the processes and tools employed in secrets management are keeping pace ...

How SBOMs power secure software acquisition | Sonatype Blog

CISA's Supply Chain Integrity Month reminds us of an undeniable truth about modern software development: transparency in software supply chains is no longer optional. The theme of week 4 is "Transparency: Securing Hardware and Software Across the ...

Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help

Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s ...

What is the xBOM?

The software supply chain has never been more complex — or more critical to secure. For years, the Software Bill of Materials (SBOM) has been the go-to tool for documenting components within software, offering much-needed visibility into ...

BSidesLV24 – Ground Truth – ZERO-RULES Alert Contextualizer & Correlator

Author/Presenter: Ezz Tahoun Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

ADR vs EDR and WAF | Application Security Tool Comparison | Contrast Security

New research demonstrates cyberattacks on the application layer often evade the most common tools, Endpoint Detection and Response (EDR) and web application firewalls (WAFs). Contrast Labs spent several weeks testing several attack methods to ...

AI Innovation at Risk: FireTail’s 2025 Report Reveals API Security as the Weak Link in Enterprise AI Strategies – FireTail Blog

Apr 25, 2025 - Alan Fagan - Washington, D.C. — 25th April 2025 — FireTail, the leading AI & API security platform, has released its annual report, The State of AI & API Security 2025, revealing a critical blind spot in the way ...

Guide: What is KMI (Key Management Infrastructure)?

One of the most critical elements of modern information security is encryption. Encryption is a complex field based solely on the arms race between people seeking secure ways to encode and encrypt data at rest and in transit and those seeking to ...

New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments

When we think about vishing (voice phishing), the usual suspects come to mind: fake refund scams impersonating Norton, PayPal, or Geek Squad. The post New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments appeared first on ...

North Korean Group Creates Fake Crypto Firms in Job Complex Scam

The North Korean hackers behind the Contagious Interview worker scam, which threat intelligence analysts have followed since late 2023, are now hiding behind three bogus crypto companies they created as fronts for their info- and crypto-stealing ...

Euler’s Königsberg Bridges: How Simple Math Can Model Lateral Movement for Effective Microsegmentation

You may have seen the “no-lift pencil” puzzles online — challenges that ask you to draw a shape without lifting your pencil or retracing any lines. I solved a few of these on our whiteboard at home, much to my kids’ amazement. Of course, ...

HiddenLayer Researchers Surface Prompt Technique Bypassing All AI Guardrails

HiddenLayer this week disclosed its researchers have discovered a prompt injection technique that bypasses instruction hierarchy and safety guardrails across all the major foundational artificial intelligence (AI) models. The post HiddenLayer ...