Application Security News and Articles


BSidesSF 2025: Effective Handling of Third-Party Supplier Incidents

Creator/Author/Presenter: Kasturi Puramwar Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...

SAST vs. DAST: Decoding the Two Pillars of Application Security

In the world of software development, speed is king. But shipping code fast without shipping it securely is like building a…Continue reading on Medium »

What GPT‑5 means for IT teams, devs, and the future of AI at work

OpenAI has released GPT‑5, the newest version of its large language model. It’s now available to developers and ChatGPT users, and it brings some real changes to how AI can be used in business and IT environments. GPT‑5 (with thinking) ...

SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

SonicWall has been investigating reports about a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability.  The post SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability ...

Google Breached — What We Know, What They’re Saying

GOOG CRM PII AWOL: ‘ShinyHunters’ group hacked big-G and stole a load of customer data from a Salesforce cloud instance. The post Google Breached — What We Know, What They’re Saying appeared first on Security Boulevard.

AI Personas, Deepfakes, and the Collapse of Trust (Part 2)

This is my second in a three-part series unpacking OpenAI’s June 2025 threat intelligence report and what it signals for enterprise communication security. The post AI Personas, Deepfakes, and the Collapse of Trust (Part 2) appeared first on ...

VMware Cracks the Code: VCF 9.0 Delivers Enterprise Security Without Operational Sacrifice

The enterprise infrastructure landscape is about to experience a fundamental shift. VMware Cloud Foundation (VCF) 9.0 isn’t just another incremental update, it’s a fundamental reimagining of how organizations approach infrastructure ...

Protecting your web applications against the OWASP Top 10 

Web application security is a critical concern for businesses of all sizes. As more companies rely on web applications to manage their operations, store sensitive data and interact with customers, their associated risks continue to grow. The Open ...

BSidesSF 2025: Is Vulnerability Management Dead? A Security Architect’s Survival Guide

Creator/Author/Presenter: Snir Ben Shimol Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...

How D-EDGE Cut Bot Traffic by 75% & Reclaimed Platform Performance with DataDome

D-EDGE reduced bot traffic by 75% with DataDome, improving platform performance, data visibility, and control—without slowing down teams or users. The post How D-EDGE Cut Bot Traffic by 75% & Reclaimed Platform Performance with DataDome ...

Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains 

Open source drives modern software—but with innovation comes risk. Learn how Sonatype secures the software supply chain to enable safer, faster delivery. The post Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains  ...

Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily ...

Human Error: Lessons from the 2006 VA Data Breach

In a recent podcast interview with Cybercrime Magazine host, Davie Braue, Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems reflect on a 2006 data breach which served as a cybersecurity wake up call ...

Probably Secure: A Look At The Security Concerns Of Deterministic Vs Probabilistic Systems

Learn why deterministic security remains essential in an AI-driven world and how GitGuardian combines probability and proof for safe, auditable development. The post Probably Secure: A Look At The Security Concerns Of Deterministic Vs ...

Black Hat USA 2025 – Summary of Vendor Announcements (Part 3)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) appeared first on SecurityWeek.

8 Essential Questions for Your Workforce Identity Verification (IDV) Vendor

Choosing the right identity verification (IDV) partner is one of the most critical security decisions you'll make. As organizations fortify their defenses, it’s clear that verifying the identity of your workforce requires a fundamentally ...

We’re a Major Player in the 2025 IDC MarketScape for CNAPP. Here’s Why That Matters for Your Cloud Security.

“With a strong focus on CNAPP through Tenable Cloud Security and exposure management with Tenable One, Tenable provides visibility and control over hybrid attack surfaces, including on-premises, cloud, and hybrid environments,” according to ...

Air France, KLM Say Hackers Accessed Customer Data

Airlines Air France and KLM have disclosed a data breach stemming from unauthorized access to a third-party platform. The post Air France, KLM Say Hackers Accessed Customer Data appeared first on SecurityWeek.

Software License Non-Compliance Is Expensive

Software license non-compliance can carry steep penalties, and breaking service level agreements (SLAs) can also be costly. The post Software License Non-Compliance Is Expensive appeared first on Azul | Better Java Performance, Superior Java ...

MY TAKE: The GenAI security crisis few can see — but these startups are mapping the gaps

LAS VEGAS — A decade ago, the rise of public cloud brought with it a familiar pattern: runaway innovation on one side, and on the other, a scramble to retrofit security practices not built for the new terrain. Related: GenAI … (more…) The ...