Application Security News and Articles


DataLocker boosts data security with DL GO and MySafeConsole

DataLocker introduces DL GO, a secure and easy-to-use encrypted USB flash drive, alongside MySafeConsole, a lightweight cloud console that gives individuals and small teams centralized control, without enterprise cost. DL GO safeguards data with ...

Deepfakes are rewriting the rules of geopolitics

Deception and media manipulation have always been part of warfare, but AI has taken them to a new level. Entrust reports that deepfakes were created every five minutes in 2024, while the European Parliament estimates that 8 million will circulate ...

Garak: Open-source LLM vulnerability scanner

LLMs can make mistakes, leak data, or be tricked into doing things they were not meant to do. Garak is a free, open-source tool designed to test these weaknesses. It checks for problems like hallucinations, prompt injections, jailbreaks, and ...

Fixing silent failures in security controls with adversarial exposure validation

Organizations often operate as if their security controls are fully effective simply because they’re deployed, configured, and monitored. Firewalls are in place, endpoints are protected, and SIEM rules are running. All good, right? Not so ...

AI agents are here, now comes the hard part for CISOs

AI agents are being deployed inside enterprises today to handle tasks across security operations. This shift creates new opportunities for security teams but also introduces new risks. Google Cloud’s new report, The ROI of AI 2025, shows that ...

CISOs, stop chasing vulnerabilities and start managing human risk

Breaches continue to grow in scale and speed, yet the weakest point remains unchanged: people. According to Dune Security’s 2025 CISO Risk Intelligence Survey, over 90 percent of incidents still originate from user behavior rather than ...

Flight Simulators for AI Agents — Practicing the Human-in-the-Loop

Simulators don’t just teach pilots how to fly the plane; they also teach judgment. When do you escalate? When do you hand off to air traffic control? When do you abort the mission? These are human decisions, trained under pressure, and just as ...

The Agentic Identity Sandbox — Your flight simulator for AI agent identity

We’ve all heard the promises about agentic AI transforming business operations. The reality? Most enterprise AI agent projects never make it past the pilot stage, and it’s not because the technology doesn’t work. The post The Agentic ...

Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests

Enterprises adopting agentic AI face their own black swans. Identity outages, token replay attacks, or rogue agents don’t happen every day, but when they do, the impact is massive and immediate. The problem is that most organizations still rely ...

Building an AI Pilot’s License — From Sandbox Hours to Production Readiness

Pilots don’t just train in simulators; they log hours and earn licenses. A private pilot needs a minimum number of simulator sessions before solo flight. Commercial pilots need even more. The process is standardized, measurable, and ...

TDL004 | Understanding Microsoft Zero Trust DNS with Aditi Patange

Summary In this episode, David Redekop and co host Francios Driessen interview Aditi Patange from Microsoft. The conversation focuses on the evolution of cybersecurity, on the development and importance of zero trust DNS and on Aditi’s journey ...

10 Questions CISOs Should Be Asking About File Security

The post 10 Questions CISOs Should Be Asking About File Security appeared first on Votiro. The post 10 Questions CISOs Should Be Asking About File Security appeared first on Security Boulevard.

How ADR Secures Against NPM Supply Chain Attacks | Application Detection and Response | Contrast Security

Contrast customers get certainty in moments when everyone else is guessing. When a code dependency supply-chain attack hits, they do not waste hours asking if they might be exposed. They know immediately whether their applications are running ...

Cisco Adds Bevy of AI Agents to Splunk Security Platform

Cisco at its Splunk .conf conference today added a series of artificial intelligence (AI) agents to its cybersecurity portfolio in addition to now making two editions of the Splunk Enterprise platform available. Ryan Fetterman, senior manager for ...

How to Stay Ahead in Secrets Sprawl Management

Why is Secrets Sprawl Management Crucial? How many organizations genuinely appreciate the importance of secrets management? Surprisingly fewer than expected. With the increasing proliferation of Non-Human Identities (NHIs) in modern networks, ...

Stay Reassured with Proven Secrets Rotation Strategies

Why is Secrets Rotation Essential? Where technology continues to advance and the need for end-to-end protection grows more critical, so does the need for a solid Secrets Rotation strategy. But what exactly is Secrets Rotation, and why is it ...

Stay Ahead with Advanced Identity Access Management

Are You Keeping Pace in the Cybersecurity Race? The ability to stay ahead is paramount. The playing field is an ever-evolving battleground of technology advances and new threats, where the capacity to anticipate risks and mobilize preemptive ...

How New Supply Chain Attacks Challenge SaaS Security: Lessons from UNC6395, UNC6040, and ShinyHunters

SaaS supply chain attacks exploit SaaS-to-SaaS connections using stolen OAuth tokens. Get practical steps to reduce your risk and protect business data. The post How New Supply Chain Attacks Challenge SaaS Security: Lessons from UNC6395, UNC6040, ...

BSidesSF 2025: There And Back Again: Discovering OT Devices Across Protocol Gateways

Creator, Author and Presenter: Rob King Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Microsoft Patches 86 Vulnerabilities

Microsoft has released patches for dozens of flaws in Windows and other products, including ones with ‘exploitation more likely’ rating. The post Microsoft Patches 86 Vulnerabilities appeared first on SecurityWeek.