Application Security News and Articles


20 Most Popular Developer Tools in 2025

Explore 20 essential developer tools for coding, collaboration, and project management in 2025. Find practical solutions to elevate your workflow and boost success. The post 20 Most Popular Developer Tools in 2025 appeared first on Security ...

Threat Group Scattered Lapsus$ Hunters Says It’s Shutting Down

The bad actors behind the Scattered Lapsus$ Hunters threat group say they are shutting down operations and retiring, but cybersecurity pros say law enforcement pressure is a key reason for the decision and that the hackers will likely form new ...

Randall Munroe’s XKCD ‘Wavefunction Collapse’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Wavefunction Collapse’ appeared first on Security Boulevard.

Phishing campaign targets Rust developers

Developers publishing crates (binaries and libraries written in Rust) on crates.io, Rust’s main public package registry, have been targeted with emails echoing the recent npm phishing campaign. The phishing email The emails started hitting ...

How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance ...

A Tale of Two SDLCs: Rise of the AI-Powered SDLC

"The future is already here — it's just not evenly distributed." — William Gibson The post A Tale of Two SDLCs: Rise of the AI-Powered SDLC appeared first on Security Boulevard.

DEF CON 33: DEFCON AIxCC Lacrosse Team

Creators, Authors and Presenters: Silk Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas ...

Silent Push Raises $10 Million for Threat Intelligence Platform

Silent Push, which provides Indicators of Future Attack, has raised a total of $32 million in funding. The post Silent Push Raises $10 Million for Threat Intelligence Platform appeared first on SecurityWeek.

DjangoCon US 2025: Security, Simplicity, and Community

At DjangoCon US 2025, speakers emphasized seasoned tech over hype, featuring secure GitOps workflows, simpler frontend alternatives, and sustainable open-source models. The post DjangoCon US 2025: Security, Simplicity, and Community appeared ...

Checkmarx Surfaces Lies-in-the-Middle Attack to Compromise AI Tools

Checkmarx today published a technique it has uncovered that poisons artificial intelligence (AI) agents models in a way that convinces them to tell end users that certain activities and behaviors are safe when in fact they are high risk. Darren ...

Terra Security Raises $30 Million for AI Penetration Testing Platform

The Israeli cybersecurity startup plans to expand its offensive security offering to cover more enterprise attack surface. The post Terra Security Raises $30 Million for AI Penetration Testing Platform appeared first on SecurityWeek.

SecurityScorecard acquires HyperComply to automate vendor security reviews

SecurityScorecard announced the acquisition of HyperComply. Combining SecurityScorecard’s trusted security ratings and continuous third- and fourth-party risk visibility with HyperComply’s intelligent automation capabilities will make it ...

Why 47-day SSL/TLS certificates can be used as a driver for crypto agility

SSL/TLS certificates are no longer just a technical detail, they’re now a strategic driver of crypto agility. With certificate lifespans shortening to just 47 days by 2029, organizations must adopt automation, certificate visibility, and ...

Akamai Identity Cloud Retirement — What’s Next for Your Identity and Access Management?

Learn how to migrate from Akamai Identity Cloud before shutdown. Explore alternatives, reduce risk, and future-proof your identity strategy. The post Akamai Identity Cloud Retirement — What’s Next for Your Identity and Access Management? ...

FBI Shares IoCs for Recent Salesforce Intrusion Campaigns

The cybercrime groups tracked as UNC6040 and UNC6395 have been extorting organizations after stealing data from their Salesforce instances. The post FBI Shares IoCs for Recent Salesforce Intrusion Campaigns appeared first on SecurityWeek.

A Pocket Guide to Strategic Cyber Risk Prioritization

Organizations today are under immense pressure to make smarter, faster decisions about cybersecurity. Between regulatory compliance requirements, vulnerability disclosures, and evolving threat intelligence, security leaders must constantly ...

Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway

In April, Rhode Island resident Navah Hopkins received a plea for her help to defeat legislation thousands of miles away in California. The ask came from Google, maker of the world’s most used web browser, Chrome. The tech giant sent a message ...

Proofpoint launches agentic AI to detect risks in communication channels

Proofpoint launched agentic AI solution for Human Communications Intelligence (HCI), marking a leap forward in how organizations detect, understand, and mitigate conduct and compliance risks in real time. Designed for enterprises in regulated and ...

West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach

Two years after the fact, Fairmont Federal Credit Union tells customers their personal, financial, and medical information was compromised. The post West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach appeared first ...