Skip to content

AppSec Observer

Contrast's application security blog provides the latest trends and tips in DevSecOps through instrumentation and security observability.

Subscribe Now
    Topics
    Application-layer attacks often fly under EDR's radar and form swarms of WAF alerts.

    New research demonstrates: Application-layer attacks often fly under EDR's radar, form swarms of WAF alerts

    New research demonstrates cyberattacks on the application layer often evade the most common tools, Endpoint Detection..

    Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

    Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25

    Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at..

    Wiz and Contrast Security are joining forces.

    Wiz and Contrast Security join forces to deliver clear visibility into application vulnerabilities

    Applications are a prime target for cyberattacks. However, many organizations struggle with blindspots at the..

    The unseen threat: Why reactive security fails against the rising tide of zero-day attacks

    The unseen threat: Why reactive security fails against the rising tide of zero-day attacks

    The majority — 11 out of 15 — of the top Common Vulnerabilities and Exposures (CVEs) in CISA’s most recent annual..

    Cybersecurity Insights with Contrast CISO David Lindner | 04/18/25

    Cybersecurity Insights with Contrast CISO David Lindner | 04/18/25

    Insight No. 1 — CVE program’s near-death exposes security's single point of failure The recent near-halt of the CVE..

    Cybersecurity Insights with Contrast CISO David Lindner

    Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

    Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh..

    Monthly ADR Report: Untrusted deserialization tops March’s application attacks chart

    Monthly ADR Report: Untrusted deserialization tops March’s application attacks chart

    Cyberattackers are shifting their strategy in attacking applications and focusing on one of the most dangerous tactics...

    Cybersecurity Insights with Contrast CISO David Lindner

    Cybersecurity Insights with Contrast CISO David Lindner | 04/04/25

    Insight No. 1 — Cyber calm: Lead like a Zen master, fight like a ninja Remaining calm is a cornerstone of effective..

    Cybersecurity Insights with Contrast CISO David Lindner

    Cybersecurity Insights with Contrast CISO David Lindner | 03/28/25

    Insight No. 1 — Phishing 2.0: Time to throttle your old password With phishing attacks growing more sophisticated —..