Application Security News and Articles


Checkmarx Surfaces Lies-in-the-Middle Attack to Compromise AI Tools

Checkmarx today published a technique it has uncovered that poisons artificial intelligence (AI) agents models in a way that convinces them to tell end users that certain activities and behaviors are safe when in fact they are high risk. Darren ...

Terra Security Raises $30 Million for AI Penetration Testing Platform

The Israeli cybersecurity startup plans to expand its offensive security offering to cover more enterprise attack surface. The post Terra Security Raises $30 Million for AI Penetration Testing Platform appeared first on SecurityWeek.

SecurityScorecard acquires HyperComply to automate vendor security reviews

SecurityScorecard announced the acquisition of HyperComply. Combining SecurityScorecard’s trusted security ratings and continuous third- and fourth-party risk visibility with HyperComply’s intelligent automation capabilities will make it ...

Why 47-day SSL/TLS certificates can be used as a driver for crypto agility

SSL/TLS certificates are no longer just a technical detail, they’re now a strategic driver of crypto agility. With certificate lifespans shortening to just 47 days by 2029, organizations must adopt automation, certificate visibility, and ...

Akamai Identity Cloud Retirement — What’s Next for Your Identity and Access Management?

Learn how to migrate from Akamai Identity Cloud before shutdown. Explore alternatives, reduce risk, and future-proof your identity strategy. The post Akamai Identity Cloud Retirement — What’s Next for Your Identity and Access Management? ...

FBI Shares IoCs for Recent Salesforce Intrusion Campaigns

The cybercrime groups tracked as UNC6040 and UNC6395 have been extorting organizations after stealing data from their Salesforce instances. The post FBI Shares IoCs for Recent Salesforce Intrusion Campaigns appeared first on SecurityWeek.

A Pocket Guide to Strategic Cyber Risk Prioritization

Organizations today are under immense pressure to make smarter, faster decisions about cybersecurity. Between regulatory compliance requirements, vulnerability disclosures, and evolving threat intelligence, security leaders must constantly ...

Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway

In April, Rhode Island resident Navah Hopkins received a plea for her help to defeat legislation thousands of miles away in California. The ask came from Google, maker of the world’s most used web browser, Chrome. The tech giant sent a message ...

Proofpoint launches agentic AI to detect risks in communication channels

Proofpoint launched agentic AI solution for Human Communications Intelligence (HCI), marking a leap forward in how organizations detect, understand, and mitigate conduct and compliance risks in real time. Designed for enterprises in regulated and ...

West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach

Two years after the fact, Fairmont Federal Credit Union tells customers their personal, financial, and medical information was compromised. The post West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach appeared first ...

Samsung Patches Zero-Day Exploited Against Android Users

Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor. The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek.

Hacker Deceives 18,000 Script Kiddies with Fake Malware Builder

A threat actor targeted low-skilled hackers, known as ‘script kiddies’ with a fake malware builder that secretly infected them with a backdoor to st The post Hacker Deceives 18,000 Script Kiddies with Fake Malware Builder appeared first on ...

Implementing Single Sign-on Solutions

Learn how to implement single sign-on (SSO) solutions for your enterprise. This guide covers SSO protocols, security best practices, and choosing the right SSO provider. The post Implementing Single Sign-on Solutions appeared first on Security ...

An Overview of Passwordless Authentication

Explore passwordless authentication methods, benefits, and implementation strategies. Learn how to enhance security and user experience by eliminating passwords. The post An Overview of Passwordless Authentication appeared first on Security ...

New Research Reveals One-Third of Cloud Assets Harbor Easily Exploitable Vulnerabilities

Analysis of nearly five million internet-exposed assets shows significant security gaps across major cloud platforms, with Google Cloud-hosted assets showing highest vulnerability rates.    The post New Research Reveals One-Third of Cloud ...

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is ...

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format, making it easy to search and access. The solution includes ...

What could a secure 6G network look like?

The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it ...

Why neglected assets are the hidden threat attackers love to find

In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned ...

Static feeds leave intelligence teams reacting to irrelevant or late data

Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues that most current ...