Application Security News and Articles
Are You Optimizing Your NHIs for Cyber Attack Resilience? When faced with the myriad challenges of cybersecurity, have you considered how to optimize your Non-Human Identities (NHIs) for better protection against cyber threats? NHIs, representing ...
What Are Non-Human Identities (NHIs) in Cybersecurity? Have you ever considered the importance of trust within your organization’s cybersecurity framework? Trust is not just applicable to human interactions but also extends to non-human ...
How Can NHI Management Revolutionize Your Security Practices? How can organizations bridge the gap between their security and R&D teams to create a more secure cloud environment? The answer lies in the effective management of Non-Human ...
Are Your NHIs in Hybrid Cloud Environments Truly Secure? Is your organization leveraging the benefits of a hybrid cloud environment while ensuring the security of its Non-Human Identities? NHIs, or machine identities, are increasingly pivotal ...
Our customers are proving what exposure management can do. Thank you for trusting us to be part of your mission.
Key takeaways
Tenable believes our evolution of exposure management and our strong, mature partner ecosystem contributed to our ...
A deep dive into architecture, security, and practical implementation for developers who want to truly understand MCP
The post MCP for Technical Professionals: A Comprehensive Guide to Understanding and Implementing the Model Context Protocol ...
Wiz found the secrets and warned that they can expose training data, organizational structures, and private models.
The post Many Forbes AI 50 Companies Leak Secrets on GitHub appeared first on SecurityWeek.
Discover DataDome’s Q3 2025 product & platform updates, including AI-driven fraud defense, adaptive protection, and new tools to control, monetize, and secure evolving AI traffic.
The post AI, Adaptability, & Ease: What’s New in ...
The flaws tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 have been patched.
The post Runc Vulnerabilities Can Be Exploited to Escape Containers appeared first on SecurityWeek.
For years, HYPR and Yubico have stood shoulder to shoulder in the mission to eliminate passwords and improve identity security. Yubico’s early and sustained push for FIDO-certified hardware authenticators and HYPR’s leadership as part of the ...
Identity threats are escalating. Attackers increasingly exploit compromised credentials, often undetected by organizations, and use social engineering to gain access. Most companies lack visibility into service account activity and don’t have ...
As GenAI transforms cyberattacks and defenses, organizations must strengthen the human layer. Learn how AI multiplies both risk and resilience in 2025.
The post Generative AI: The Double-Edged Sword of Cybersecurity appeared first on Security ...
OWASP has added two new categories to the revised version of its Top 10 list of the most critical risks to web applications.
The post Two New Web Application Risk Categories Added to OWASP Top 10 appeared first on SecurityWeek.
My readers will know by now that I am addicted to PACER - the Public Access to Court Electronic Records. When I see headlines like this one, I am compelled to dive in and read every publicly released document related to the ...
Three more VS Code extensions were infected last week and the malware has emerged in GitHub repositories as well.
The post GlassWorm Malware Returns to Open VSX, Emerges on GitHub appeared first on SecurityWeek.
Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before:
Almost all cloud services have to perform some computation on our data. Even the ...
The Cl0p website lists major organizations such as Logitech, The Washington Post, Cox Enterprises, Pan American Silver, LKQ Corporation, and Copeland.
The post Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site appeared ...
Multiple vulnerabilities across QNAP’s portfolio could lead to remote code execution, information disclosure, and denial-of-service (DoS) conditions.
The post QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland appeared first on SecurityWeek.
Australia mirrored the US’s recent sanctions against bankers, financial institutions, and others allegedly involved in laundering funds for North Korea.
The post Australia Sanctions Hackers Supporting North Korea’s Weapons Program ...