Application Security News and Articles


Vectra AI redefines hybrid resilience across the attack lifecycle

Vectra AI redefines hybrid attack resilience across the full attack lifecycle by unifying controls pre-and-post compromise within the Vectra AI Platform. Vectra AI’s control philosophy empowers defenders with continuous control through ...

Securing the AI Revolution: NSFOCUS LLM Security Protection Solution

As Artificial Intelligence technology rapidly advances, Large Language Models (LLMs) are being widely adopted across countless domains. However, with this growth comes a critical challenge: LLM security issues are becoming increasingly prominent, ...

Dux Emerges From Stealth Mode With $9 Million in Funding

The startup takes an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets. The post Dux Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek.

Why vulnerability reports stall inside shared hosting companies

Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those reports arrive and explains why remediation so often ...

The Rise of Precision Botnets in DDoS

For a long time, DDoS attacks were easy to recognize. They were loud, messy, and built on raw throughput. Attackers controlled massive botnets and flooded targets until bandwidth or infrastructure collapsed. It was mostly a scale problem, not an ...

Banks built rules for yesterday’s crime and RegTech is trying to fix that

Criminals are moving money across borders faster, and financial institutions are feeling the squeeze. Compliance teams feel this strain every day as they try to keep up with schemes that shift through accounts, intermediaries, and digital ...

Zabbix: Open-source IT and OT observability solution

Zabbix is an open source monitoring platform designed to track the availability, performance, and integrity of IT environments. It monitors networks along with servers, virtual machines, applications, services, databases, websites, and cloud ...

How exposure management changes cyber defense

In this Help Net Security video, Larry Slusser, VP of Strategy at SixMap, explains why endpoint detection and response is only part of the security story. Drawing on his work as an incident responder, engagement manager, and ransomware ...

AI breaks the old security playbook

AI has moved into enterprise operations faster than many security programs expected. It is embedded in workflows, physical systems, and core infrastructure. Some AI tools reach hundreds of millions of users each week. Inference costs have fallen ...

Homomorphic Encryption for Privacy-Preserving Model Context Sharing

Discover how homomorphic encryption (HE) enhances privacy-preserving model context sharing in AI, ensuring secure data handling and compliance for MCP deployments. The post Homomorphic Encryption for Privacy-Preserving Model Context Sharing ...

What is the Difference Between LDAP and Single Sign-On?

Explore the differences between LDAP and Single Sign-On (SSO) for user authentication. Understand their use cases, benefits, and how they fit into your enterprise security strategy. The post What is the Difference Between LDAP and Single Sign-On? ...

Configuring Users Without OTP Login: A Guide

Learn how to configure users without OTP login in your applications. This guide covers conditional authentication, account settings, and fallback mechanisms for seamless access. The post Configuring Users Without OTP Login: A Guide appeared first ...

Assura Named to MSSP Alert and Cyber Alliance’s 2025 “Top 250 MSSPs,” Ranking at Number 94

FOR IMMEDIATE RELEASE Richmond, VA — December 11, 2025 — Assura is proud to announce that it has been named to the MSSP Alert and CyberRisk Alliance partnership’s prestigious Top 250 MSSPs list for 2025, securing the #94 position among ...

Google Finds Five China-Nexus Groups Exploiting React2Shell Flaw

Researchers with Google Threat Intelligence Group have detected five China-nexus threat groups exploiting the maximum-security React2Shell security flaw to drop a number of malicious payloads, from backdoors to downloaders to tunnelers. The post ...

Why is secrets management vital for Agentic AI operations

Are Your Non-Human Identities (NHIs) and Secrets Truly Secure? Understanding the Importance of Securing Non-Human Identities Have you ever wondered how secure your organization’s machine identities are? Managing Non-Human Identities (NHIs) ...

How can NHIs scale security in cloud-native environments

How Secure Are Your Non-Human Identities in Cloud-Native Environments? How often do we consider the security gaps introduced by non-human identities (NHIs)? While much focus is placed on human identity protection, the oversight of NHIs—machine ...

How do NHIs enhance identity and access management

Why Are Non-Human Identities Vital in Identity and Access Management? In what ways do Non-Human Identities (NHIs) enhance identity and access management (IAM)? Where organizations expand their digital footprints, the management of NHIs becomes a ...

Leading Through Ambiguity: Decision-Making in Cybersecurity Leadership

Ambiguity isn't just a challenge. It's a leadership test - and most fail it. I want to start with something that feels true but gets ignored way too often. Most of us in leadership roles have a love hate relationship with ambiguity. We say we ...

NDSS 2025 – Selective Data Protection against Memory Leakage Attacks for Serverless Platforms

Session 6B: Confidential Computing 1 Authors, Creators & Presenters: Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University) PAPER LeakLess: Selective ...

News Alert: Link11’s Top 5 cybersecurity trends set to shape European defense strategies in 2026

Frankfurt, Dec. 16, 2025, CyberNewswire — Link11, a European provider of web infrastructure security solutions, has released new insights outlining five key cybersecurity developments expected to influence how organizations across Europe ...