Application Security News and Articles


Default Cursor setting can be exploited to run malicious code on developers’ machines

An out-of-the-box setting in Cursor, a popular AI source-code editor, could be leveraged by attackers to covertly run malicious code on users’ computers, researchers have warned. An exploitable vulnerability in the Cursor AI editor Cursor ...

Top Identity and Access Management (IAM) Solutions for 2025

Discover 25 top Identity and Access Management (IAM) solutions for 2025. Streamline access, enhance security, and find the perfect fit for your organization. The post Top Identity and Access Management (IAM) Solutions for 2025 appeared first on ...

How to Cut Your Auth0 Bill by 70% Without Losing Enterprise Features

Learn how to cut your Auth0 bill by 70% without losing enterprise features. Explore flat-rate IAM with SSOJet for predictable pricing and growth. The post How to Cut Your Auth0 Bill by 70% Without Losing Enterprise Features appeared first on ...

What is Web Application Security?

Web application security is the practice of protecting websites, online services, and applications from cyber threats that exploit vulnerabilities in their code, configurations, or design. It involves a combination of tools, processes, and best ...

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek.

Top 10 Essential DevOps Tools to Use in 2025 and Beyond

Explore the essential DevOps tools for 2025 that enhance automation, monitoring, and collaboration. Discover the latest technologies including IaC, CI/CD, conta The post Top 10 Essential DevOps Tools to Use in 2025 and Beyond appeared first on ...

Secure by Design, Visible by Choice: Why Authentication Page Optimization Matters for B2B SaaS

Enterprise customers demand both ironclad security and seamless user experiences. Your authentication pages are more than just login forms—they’re the gat The post Secure by Design, Visible by Choice: Why Authentication Page Optimization ...

The True Value of Single Sign-On (SSO): A Comprehensive Guide for Technical Professionals

This comprehensive guide was developed to help technical professionals understand the strategic value of SSO and develop implementation approaches appropriate f The post The True Value of Single Sign-On (SSO): A Comprehensive Guide for Technical ...

Zero Outages, Full Visibility: How PacificSource Automated SSL TLS Certificate Lifecycle Management

In healthcare, every second counts. From electronic health records (EHR) to patient portals and claims processing systems, secure digital communication is the backbone of delivering care and protecting sensitive patient information. That security ...

Three-Prong Ghost Hacker Scam Targets Seniors, Others 

The FBI warns of the “Phantom Hacker” scam that has stolen over $1B by tricking victims—often seniors—into moving funds to fake “safe” accounts. Experts say AI will make such scams more convincing and scalable, underscoring the need ...

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new capability integrates vendor risk management into existing service providers’ workflows. The global third-party risk ...

Building Adaptive and Future-Ready Security Strategies

Learn how to build adaptive and future-ready security strategies using Enterprise SSO and CIAM solutions. Protect your organization from evolving threats with robust authentication and access management. The post Building Adaptive and ...

Microsoft’s September Security Update High-Risk Vulnerability Notice for Multiple Products

Overview On September 10, NSFOCUS CERT detected that Microsoft released the September Security Update patch, fixing 86 security issues involving widely used products such as Windows, Microsoft Office, Azure, and Microsoft SQL Server, including ...

Hush Security emerges from stealth to replace legacy vaults with secretless access

Hush Security has raised $11 million in seed funding led by Battery Ventures and YL Ventures. As agentic AI expands, Hush replaces legacy vaults and secrets across the enterprise with just-in-time, policy-driven access controls enforced at ...

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and ...

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations ...

AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas ...

The state of DMARC adoption: What 10M domains reveal

In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing, ...

Why organizations need a new approach to risk management

To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but ...

Everything about the Authorization as a Service

Learn how authorization service, auth as a service, and authorization solutions improve security, compliance, and customer experience with CIAM and SSO. The post Everything about the Authorization as a Service appeared first on Security Boulevard.