Application Security News and Articles


Can Your NHIs Withstand a Cyber Attack?

Are You Optimizing Your NHIs for Cyber Attack Resilience? When faced with the myriad challenges of cybersecurity, have you considered how to optimize your Non-Human Identities (NHIs) for better protection against cyber threats? NHIs, representing ...

Why Trust in NHIs Is Essential for Business Security

What Are Non-Human Identities (NHIs) in Cybersecurity? Have you ever considered the importance of trust within your organization’s cybersecurity framework? Trust is not just applicable to human interactions but also extends to non-human ...

Empower Your Security Team with Efficient NHI Management

How Can NHI Management Revolutionize Your Security Practices? How can organizations bridge the gap between their security and R&D teams to create a more secure cloud environment? The answer lies in the effective management of Non-Human ...

How Safe Are Your NHIs in Hybrid Cloud Environments?

Are Your NHIs in Hybrid Cloud Environments Truly Secure? Is your organization leveraging the benefits of a hybrid cloud environment while ensuring the security of its Non-Human Identities? NHIs, or machine identities, are increasingly pivotal ...

Tenable Is a Leader in the First-Ever Gartner® Magic Quadrant™ for Exposure Assessment Platforms

Our customers are proving what exposure management can do. Thank you for trusting us to be part of your mission. Key takeaways Tenable believes our evolution of exposure management and our strong, mature partner ecosystem contributed to our ...

MCP for Technical Professionals: A Comprehensive Guide to Understanding and Implementing the Model Context Protocol

A deep dive into architecture, security, and practical implementation for developers who want to truly understand MCP The post MCP for Technical Professionals: A Comprehensive Guide to Understanding and Implementing the Model Context Protocol ...

Many Forbes AI 50 Companies Leak Secrets on GitHub

Wiz found the secrets and warned that they can expose training data, organizational structures, and private models. The post Many Forbes AI 50 Companies Leak Secrets on GitHub appeared first on SecurityWeek.

AI, Adaptability, & Ease: What’s New in DataDome’s Q3 2025 Platform Updates

Discover DataDome’s Q3 2025 product & platform updates, including AI-driven fraud defense, adaptive protection, and new tools to control, monetize, and secure evolving AI traffic. The post AI, Adaptability, & Ease: What’s New in ...

Runc Vulnerabilities Can Be Exploited to Escape Containers

The flaws tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 have been patched. The post Runc Vulnerabilities Can Be Exploited to Escape Containers appeared first on SecurityWeek.

HYPR and Yubico Deepen Partnership to Secure and Scale Passkey Deployment Through Automated Identity Verification

For years, HYPR and Yubico have stood shoulder to shoulder in the mission to eliminate passwords and improve identity security. Yubico’s early and sustained push for FIDO-certified hardware authenticators and HYPR’s leadership as part of the ...

Download: Strengthening Identity Security whitepaper

Identity threats are escalating. Attackers increasingly exploit compromised credentials, often undetected by organizations, and use social engineering to gain access. Most companies lack visibility into service account activity and don’t have ...

Generative AI: The Double-Edged Sword of Cybersecurity 

As GenAI transforms cyberattacks and defenses, organizations must strengthen the human layer. Learn how AI multiplies both risk and resilience in 2025. The post Generative AI: The Double-Edged Sword of Cybersecurity  appeared first on Security ...

Two New Web Application Risk Categories Added to OWASP Top 10

OWASP has added two new categories to the revised version of its Top 10 list of the most critical risks to web applications. The post Two New Web Application Risk Categories Added to OWASP Top 10 appeared first on SecurityWeek.

Crypto-less Crypto Investment Scams: A California Case

My readers will know by now that I am addicted to PACER - the Public Access to Court Electronic Records.  When I see headlines like this one, I am compelled to dive in and read every publicly released document related to the ...

GlassWorm Malware Returns to Open VSX, Emerges on GitHub

Three more VS Code extensions were infected last week and the malware has emerged in GitHub repositories as well. The post GlassWorm Malware Returns to Open VSX, Emerges on GitHub appeared first on SecurityWeek.

New Attacks Against Secure Enclaves

Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before: Almost all cloud services have to perform some computation on our data. Even the ...

Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site

The Cl0p website lists major organizations such as Logitech, The Washington Post, Cox Enterprises, Pan American Silver, LKQ Corporation, and Copeland. The post Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site appeared ...

QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland

Multiple vulnerabilities across QNAP’s portfolio could lead to remote code execution, information disclosure, and denial-of-service (DoS) conditions. The post QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland appeared first on SecurityWeek.

Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Australia mirrored the US’s recent sanctions against bankers, financial institutions, and others allegedly involved in laundering funds for North Korea. The post Australia Sanctions Hackers Supporting North Korea’s Weapons Program ...