Application Security News and Articles


Back to School Means Back to Breaches

Cybercriminals are increasingly targeting schools and universities. Learn how students, parents, and educators can strengthen cybersecurity defenses. The post Back to School Means Back to Breaches appeared first on Security Boulevard.

Automotive Titan Stellantis Discloses Data Breach

The company says customer contact information was stolen from a third-party service provider’s platform. The post Automotive Titan Stellantis Discloses Data Breach appeared first on SecurityWeek.

Building SaaS Features for Enterprise Readiness

Make your SaaS enterprise-ready! Learn how to build essential features like SSO, SAML, OIDC, and achieve SOC 2 compliance for security and scalability. The post Building SaaS Features for Enterprise Readiness appeared first on Security Boulevard.

Driving Meaningful Success for Enterprise Security Initiatives

Learn how to drive meaningful success for enterprise security initiatives using SSO and CIAM. Align security with business goals, implement effective strategies, and measure impact. The post Driving Meaningful Success for Enterprise Security ...

The $100K H-1B Visa Fee: What It Means for Businesses and How to Plan Ahead

On September 21, 2025, a new executive order went into effect requiring a $100,000 fee for any new H-1B visa petition. This is more than...Read More The post The $100K H-1B Visa Fee: What It Means for Businesses and How to Plan Ahead appeared ...

Blackdot Videris Automate uses AI to speed OSINT, risk detection, and decision-making

Blackdot Solutions unveiled Videris Automate, a platform that delivers new AI capabilities to automate investigations and screening processes. The launch marks a step-change in how organizations can detect risks, uncover hidden connections, and ...

Passwordless Authentication Options Available

Explore the landscape of passwordless authentication options, including Windows Hello, Microsoft Authenticator, FIDO2, and certificate-based methods. Enhance security and user experience. The post Passwordless Authentication Options Available ...

Cybercriminals are going after law firms’ sensitive client data

Regardless of their size, all law firms hold valuable data, including client communications, financial records, and confidential legal strategies. That data has never been more at risk. Cybercriminals are targeting law firms by exploiting ...

How Authentication Reduces Fake Submissions in Online Classes

Learn how authentication in online classes prevents impersonation, plagiarism, and outsourcing of work, ensuring fairness and academic integrity. The post How Authentication Reduces Fake Submissions in Online Classes appeared first on Security ...

Customer Identity and Access Management: A Complete Guide to Fundamentals, Implementation, and Security

Customer Identity and Access Management represents a critical capability for organizations seeking to build trusted, long-term relationships with their customer The post Customer Identity and Access Management: A Complete Guide to Fundamentals, ...

Review: Practical Purple Teaming

Practical Purple Teaming is a guide to building stronger collaboration between offensive and defensive security teams. The book focuses on how to design and run effective purple team exercises that improve detection and response and strengthen ...

Gartner: Preemptive cybersecurity to dominate 50% of security spend by 2030

By 2030, preemptive cybersecurity solutions will account for 50% of IT security spending, up from less than 5% in 2024, replacing standalone detection and response (DR) solutions as the preferred approach to defend against cyberthreats, according ...

High-impact IT outages cost businesses $2 million per hour

The financial stakes of downtime are climbing, and IT leaders are being pushed to rethink how they monitor complex systems. According to the 2025 Observability Forecast from New Relic, the median cost of a high-impact outage has reached $2 ...

Cybersecurity jobs available right now: September 23, 2025

Application Security Engineer PayPal | USA | On-site – View job details As an Application Security Engineer, you will apply security best practices to enhance and optimize systems, ensuring protection and efficiency, while ...

H2O-3 JDBC Deserialization Vulnerability (CVE-2025-6544)

Overview Recently, NSFOCUS CERT detected that H2O-3 released a security update to fix the H2O-3 JDBC deserialization vulnerability (CVE-2025-6544); This vulnerability is a bypass of CVE-2025-6507. Due to the system’s flawed handling of JDBC ...

Microsoft DCU’s Takedown of RaccoonO365

 When I saw the name of the Microsoft Digital Crime Unit's latest target, "RaccoonO365" I probably reacted to it differently than most.  With the help of a friend in Lagos, we've been watching the money launderers and things have reached a ...

Anton’s Security Blog Quarterly Q3 2025

Amazingly, Medium has fixed the stats so my blog / podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on ...

KuppingerCole 2025: Why Thales is a Market Leader in API Security

APIs are the backbone of modern applications connecting critical microservices and enabling enterprises to turn data into context-aware business logic via AI across their digital services. As applications become more contextual, APIs expose the ...

Gin & Juice Shop Benchmark: How DAST Tools Really Stack Up

In this article, we benchmark Escape against other DAST tools. Focusing on Gin & Juice Shop, we compare results across different Web Apps. The post Gin & Juice Shop Benchmark: How DAST Tools Really Stack Up appeared first on Security ...

European Airport Disruptions Caused by Ransomware: EU Cyber Office

The EU's cybersecurity agency says the widespread disruptions at airports in Belgium, England, and Germany were the result of a ransomware attack on third-party on-boarding software from Collins Aerospace that was used at all three airports. The ...