Application Security News and Articles


What are the Biggest Cybersecurity Nightmares Your Business Might Face in 2025?

In 2025, cybersecurity isn’t just IT’s job — it’s a core business survival skill against faster, smarter and more targeted threats. The post What are the Biggest Cybersecurity Nightmares Your Business Might Face in 2025? appeared first on ...

Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java

Many global regulations and legislations have strict requirements around Java application security, incident reporting, and more. Azul has an unmatched set of solutions. The post Three Ways to Ensure Regulatory and Legislative Compliance with ...

SAP Patches Critical S/4HANA Vulnerability

SAP has released 15 new security notes on the August 2025 Patch Tuesday, including for critical vulnerabilities. The post SAP Patches Critical S/4HANA Vulnerability appeared first on SecurityWeek.

IRONSCALES Named to Inc. 5000 List of America’s Fastest-Growing Private Companies for Fifth Consecutive Year

  The post IRONSCALES Named to Inc. 5000 List of America’s Fastest-Growing Private Companies for Fifth Consecutive Year appeared first on Security Boulevard.

The Future of AI in Cyber Risk Management: What Gartner’s 2025 Report Tells Us

Picture this: Your cybersecurity team just received 10,000 new vulnerability alerts, three compliance frameworks need updating, and the board wants a risk assessment by Friday. Sound familiar? The post The Future of AI in Cyber Risk Management: ...

PortSwigger Lab: Blind OS Command Injection with Out-of-Band Exfiltration

Sometimes, the most powerful exploits don’t show a single hint in the app’s response.Continue reading on System Weakness »

Executive PII Exposure: Why You Need Ongoing Monitoring

Nisos Executive PII Exposure: Why You Need Ongoing Monitoring Exposed personal data is fueling executive impersonation, fraud, and social engineering. Here's what enterprise leaders need to know... The post Executive PII Exposure: Why You Need ...

OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

The recently patched Erlang/OTP flaw CVE-2025-32433 has been exploited since early May, shortly after its existence came to light. The post OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability appeared first on SecurityWeek.

How to detect Open Bullet 2 bots running in Puppeteer mode

Open Bullet 2 is an open-source tool built for credential stuffing attacks, automated attempts to gain access to user accounts using stolen credentials from data breaches. It supports both website and mobile application targets and has become a ...

AI-Driven Vulnerability Management as a Solution for New Era

Vulnerability management (VM) is the continuous process of finding, evaluating, listing, reporting, and providing AI-driven patch recommendations for security vulnerabilities across an organization’s inventory. In practice, this means regularly ...

APT groups are getting personal, and CISOs should be concerned

Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work ...

What makes a security program mature and how to get there faster

Security leaders are flush with tools and data, but it’s not helping their programs mature. In this Help Net Security video, PlexTrac’s Dan DeCloss outlines the 3 key gaps holding security programs back and what sets mature programs ...

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues. It’s designed to help security professionals practice spotting and exploiting common misconfigurations. The ...

From Risk to ROI: How Security Maturity Drives Business Value

From Risk to ROI: How Security Maturity Drives Business Value madhav Tue, 08/12/2025 - 04:30 Cyber threats are like moving targets—constantly evolving and increasingly pervasive. In a hyper-connected world, no individual, industry, or ...

Why DNS threats should be on every CISO’s radar in 2025

DNS is once again in the crosshairs of threat actors. According to the 2025 DNS Threat Landscape Report by Infoblox, attackers are changing tactics, and enterprises are feeling the pressure. The report shows that DNS is being used to exfiltrate ...

Cybersecurity jobs available right now: August 12, 2025

Cloud Platforms Engineering Manager Mozn | UAE | Remote – View job details As a Cloud Platforms Engineering Manager, you will lead the design, implementation, and lifecycle management of scalable, secure, and highly available ...

From static to dynamic: Transitioning your secrets management strategy

A simple internal tool can lead to significant maintenance debt, security risks, and compliance failures. Learn the path to a more scalable solution. The post From static to dynamic: Transitioning your secrets management strategy appeared first ...

New State Privacy Laws Going into Effect in 2025: What You Need to Know

Key Takeaways The Patchwork of U.S. Privacy Laws If you’ve been tracking U.S. privacy law, you already know that there’s no single national rulebook. Instead, we’re living in a growing mosaic of state-by-state legislation. Some states aim ...

Stay Ahead of Cyber Threats in Secret Management

Is Your Strategy Robust Enough to Keep Pace With Emerging Cyber Threats in Secret Management? The stakes for organizations across industries like healthcare, financial services, and travel are higher than ever. Non-Human Identities (NHIs) and ...

Empower Teams with Effective IAM Strategies

Why is Secure NHI Management Critical for Successful Team Empowerment? How often does secure Non-Human Identity (NHI) management come to mind? Considering the increasing reliance on cloud-based solutions across industries, including healthcare, ...