Application Security News and Articles


Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer

Cisco unveils its Quantum Network Entanglement Chip and new Quantum Labs, laying the groundwork for a scalable quantum internet that connects distributed quantum computers into a unified, powerful system. The post Cisco’s Quantum Bet: Linking ...

Pulumi Enhances Developer Experience with Improved IDP and Components

Discover Pulumi's enhanced Components feature and IDP for streamlined cloud infrastructure management. Simplify your IaC process today! The post Pulumi Enhances Developer Experience with Improved IDP and Components appeared first on Security ...

Microsoft Discontinues Authenticator Password Manager, Shift to Edge

Significant changes to Microsoft Authenticator's password management are coming. Prepare now to avoid losing access to your saved passwords! The post Microsoft Discontinues Authenticator Password Manager, Shift to Edge appeared first on Security ...

CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform 

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million. The post CodeAnt AI Raises $2 Million for Code Quality and Application Security Platform  appeared first on SecurityWeek.

Trump Proposes Cutting CISA Budget by $491 Million

President Trump wants to cut CISA's budget by $491 million, or 17%, to refocus it on its "core mission" and end what he said is censorship of him and his supporters. Critics of the cuts accusing the administration of politicizing cybersecurity ...

CrowdStrike Plans Layoffs to Pursue $10B ARR Target

CrowdStrike said the planned cuts will affect approximately 500 employees and will span the first half of fiscal 2026. The post CrowdStrike Plans Layoffs to Pursue $10B ARR Target appeared first on SecurityWeek.

Why the Finance Sector Must Lead the Shift to Post-Quantum Cryptography

Quantum computing is not some far-off theory anymore, and the threat to today’s encryption is real with the clock running for organizations to be resilient. And for banks and finance organizations sitting on mountains of sensitive data, the ...

Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue 

Ox Security has raised a total $94 million since its launch in 2021 with ambitious plans to cash in on two fast-moving trends. The post Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  appeared first on SecurityWeek.

What Cybercriminals Have Been Up to Lately (And Why It Should Worry You)

Learn how to improve enterprise ransomware protection from ColorTokens' latest intel brief. The post What Cybercriminals Have Been Up to Lately (And Why It Should Worry You) appeared first on ColorTokens. The post What Cybercriminals Have Been Up ...

BSidesLV24 – Proving Ground – Threat Modeling At Scale: More Than Shifting Left

Author/Presenter: Troy Bowman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Harnessing AI to Create Auth and Register Pages: A Step-Wise Guide to Enhance UX

86% of users abandon websites due to poor authentication experiences. Discover how AI can transform your login and registration pages into conversion powerhouses that adapt to each user, prevent errors before they happen, and balance security ...

Detect and crash Chromium bots with one weird trick (bots hate it!)

Disclaimer: If you're here for the holy grail of bot detection, this may not be it, unless your UX strategy involves surprise popups and your marketing strategy involves blocking Google crawlers. We recently stumbled across a bug on the Chromium ...

xAI Secret Leak: The Story of a Disclosure

AI adoption accelerates secret sprawl as organizations connect to multiple providers. Our investigation of a leaked xAI API key, which granted access to unreleased Grok models, reveals critical flaws in their disclosure process, highlighting ...

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

By baking minimum expectations into procurement conversations, the plan is to steer software vendors to “secure-by-design and default” basics. The post New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA appeared first on ...

Spyware Maker NSO Ordered to Pay WhatsApp $168 Million for 2019 Hack

Meta, which owns WhatsApp, became the first company to sue and win against NSO Group, the maker of the notorious Pegasus spyware, when a U.S. ruled in December that the vendor hacked into 1,400 mobile devices in 2019. A jury ordered NSO Group to ...

Barracuda Networks strenghtens threat detection with multimodal AI

Barracuda Networks unveiled next-generation threat detection capabilities fueled by multimodal AI. Barracuda now delivers adaptive, context-aware protection against emerging attacks with accuracy and speed by simultaneously correlating and ...

Searchlight Cyber adds AI capabilities to summarize dark web posts and threads

Searchlight Cyber has launched new AI capabilities within its dark web investigations platform, Cerberus. The new Cerberus AI Insights feature summarizes dark web posts and threads to help analysts to quickly triage information and focus on the ...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

Austin, USA / Texas, 7th May 2025, CyberNewsWire The post SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks appeared first on Security Boulevard.

Sonatype welcomes Antoine Harden as Regional Vice President of Federal

Sonatype is thrilled to announce the addition of Antoine Harden as our Regional Vice President of Federal. With a proven track record of leadership and innovation, Antoine will spearhead sales efforts across the Department of Defense, the ...

Stronger Cloud Security in Five: Securing Your Cloud Identities

After covering cloud security posture management (CSPM) and cloud workload protection (CWP) in the first two installments of Tenable’s “Stronger Cloud Security in Five” blog series, today we focus on securing your cloud identities. ...