Application Security News and Articles


SentinelOne to Acquire Observo AI in $225 Million Deal

SentinelOne is buying Observo AI for a combination of cash and stock to boost its SIEM and data offerings. The post SentinelOne to Acquire Observo AI in $225 Million Deal appeared first on SecurityWeek.

The Hidden Security Gaps in Digital Lending Applications

Here’s a wake up call for Financial Institutions like you! Digital lending applications (DLAs) have revolutionized how Indians borrow loans. It can be now approved in minutes via a smartphone. But behind this convenience lurk hidden security ...

Signal adds secure backup option for chat history

Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because ...

How to Do Code Review for an Unfamiliar Codebase

Code reviews are already one of the biggest bottlenecks in modern software delivery. But when developers are asked to review an unfamiliar…Continue reading on Medium »

How AI Code Review Tools Are Reinventing Code Quality

If you’ve ever opened a pull request and then watched it collect dust in a review queue, you’re not alone. For developers, waiting on…Continue reading on Medium »

Differences Between Privileged Access Management and Enterprise Password Management

Understand the key differences between Privileged Access Management (PAM) and Enterprise Password Management (EPM) to enhance your organization's security posture. The post Differences Between Privileged Access Management and Enterprise Password ...

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal

Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories ...

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers

Researchers have spotted a malvertising (and clever malware delivery) campaign targeting IT workers in the European Union with fake GitHub Desktop installers. “We believe the goal of this campaign was to gain initial access to organizations ...

Using PAM for Passwordless Authentication without Local Users

Explore how to implement passwordless authentication using PAM, focusing on scenarios without local user accounts. Learn about the benefits, methods, and security considerations. The post Using PAM for Passwordless Authentication without Local ...

Connected cars are racing ahead, but security is stuck in neutral

Connected cars are already on Europe’s roads, loaded with software, sensors, and constant data connections. Drivers love the features these vehicles bring, from remote apps to smart navigation, but each new connection also opens a door to ...

Attackers test the limits of railway cybersecurity

Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, ...

Employees keep feeding AI tools secrets they can’t take back

Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control ...

Are we headed for an AI culture war?

In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and how ...

Cybersecurity jobs available right now: September 9, 2025

Analyst, Cybersecurity DFIR ICE | Singapore | On-site – View job details As an Analyst, Cybersecurity DFIR, you will review and triage user-reported emails to identify phishing, malware, and other threats, taking containment ...

npm Chalk and Debug Packages Hit in Software Supply Chain Attack

The recent compromise of widely used npm packages chalk, debug, and more than a dozen others reveals that even the most trusted open source projects are not immune to compromise. The post npm Chalk and Debug Packages Hit in Software Supply Chain ...

Best practices for securing secrets in staging environments

Discover the most common secrets management mistakes in non-prod environments and how to fix them using scoped tokens, runtime injection, and tools like Doppler. The post Best practices for securing secrets in staging environments appeared first ...

Understanding the EU Corporate Sustainability Due Diligence Directive (CSDDD): Why It Matters and How to Prepare

Key Takeaways For years, European companies have faced a patchwork of national laws pushing them to take responsibility for human rights and environmental issues tied to their business operations. France passed its Duty of Vigilance law in 2017. ...

Confidence in Cloud Security with Advanced NHIs

Why Advanced NHIs Enhance Confidence in Cloud Security? With the increasing digitalization across different industries, such as financial services, healthcare, and travel, cybersecurity has become a topic of paramount importance. For ...

Powerful Strategies for Non-Human Identity Protection

Why is Effective NHI Protection Essential? Data security has emerged as a paramount concern. Organizations are increasingly relying on machine identities, also known as Non-Human Identities (NHIs), to ensure secure digital operations. However, ...

Relax with Secure and Managed Non-Human Identities

Are you Fully Leveraging Non-Human Identities for a Relaxing Security Management Experience? Non-human identities (NHIs), an integral component, are rapidly becoming a necessity for organizations operating in the cloud. When integrated with a ...