Application Security News and Articles


All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack

A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs. The post All Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection Attack appeared first on ...

How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape

Discover how implementing Escape x Wiz integration helped the DoubleVerify AppSec team achieve full API visibility and accelerate targeted remediation. The post How DoubleVerify Achieved Full API Visibility and Security with Wiz and Escape ...

5 Reasons Organization Should Opt for Web App Pentest

The world that feeds us is digital, and web applications are the backbone of many organizations. Be it e-commerce, healthcare, BFSI, or any other industry, web apps store and process sensitive data on a daily basis. As the saying goes, ‘With ...

RSAC 2025 Innovation Sandbox | Aurascape: Reconstructing the Intelligent Defense Line of AI Interactive Visibility and Native Security

Company Overview Aurascape is a cybersecurity startup founded in 2023 and headquartered in Santa Clara, California, USA. The company was co-founded by senior security experts and engineers from world-class technology companies such as Palo Alto ...

A Smarter Alternative to Entra Permissions Management

Microsoft has announced the retirement of Entra Permissions Management (formerly CloudKnox), with sales ending June 30, 2025. EPM offered valuable visibility into cloud permissions, helping teams identify overprivileged identities across AWS, ...

Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data 

As cloud environments become more complex, ensuring robust security for your cloud infrastructure is no longer an option, but a necessity.  The post Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data  appeared ...

Detectify Asset Classification and Scan Recommendations improves vulnerability testing

Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new ...

Rubrik Identity Resilience protects vulnerable authentication infrastructure

Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers – human and non-human identities (NHIs) ...

BreachLock AEV simulates Real attacks to validate and prioritize exposures

BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure ...

Dashlane introduces Omnix for AI-powered credential protection

Dashlane unveiled a new approach to addressing human risk in response to the rise of AI-driven phishing attacks and shadow IT in corporate environments. Built on innovation that pushes beyond vault-based password management, Dashlane Omnix is ...

LastPass Secure Access Experiences simplifies access management

As cloud app adoption continues to rise, and the modern workplace continues to evolve, LastPass will introduce a new approach to democratize access management. Built with the needs of small-to-mid-sized businesses in mind, Secure Access ...

RSAC 2025 Innovation Sandbox | Knostic: Reshaping the Access Control Paradigm for Enterprise AI Security

Introduction As generative artificial intelligence (GenAI) and large language models (LLM) rapidly penetrate corporate operations, data leakage and privacy risks have become major challenges faced by enterprises. Knostic, a startup founded in ...

Vanta AI Security Assessment evaluates AI risk

Vanta announced new ways to help organizations demonstrate AI security and evaluate AI risk across their ecosystem. With the launch of Vanta’s new AI Security Assessment offering, customers using, developing or building with AI can now more ...

Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing

Vulnerabilities: It's not their presence but their visibility and controlled management that defines secure development. The post Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing appeared first on Security ...

Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia

Stay updated with the latest in Java! Discover key updates from OpenJDK, Spring Framework, and AWS, plus critical news affecting the community. The post Java and AWS Updates, Mayor’s Budget Cuts, and Floods in Indonesia appeared first on ...

Flexible working models fuel surge in device theft

76% of respondents have been impacted by incidents of device theft in the past two years, with incidents more common in organizations with more flexible working models, according to Kensington. For instance, research revealed that 85% of ...

Exposure validation emerges as critical cyber defense component

Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to ...

13 core principles to strengthen AI cybersecurity

The new ETSI TS 104 223 specification for securing AI provides reliable and actionable cybersecurity guidance aimed at protecting end users. Adopting a whole-lifecycle approach, the framework outlines 13 core principles that expand into 72 ...

Top must-visit companies at RSAC 2025

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco from April 28 – May 1. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork to ...

New infosec products of the week: April 25, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, PowerDMARC, Skyhawk Security, Stellar Cyber, Swimlane, and Veracode. Email authentication simplified: How PowerDMARC makes DMARC effortless ...