Application Security News and Articles


Scattered Spider Targets Aflac, Other Insurance Companies

The prolific Scattered Spider threat group, which recently targeted U.S. and UK retailers in a series of attacks, is now turning its attention to the insurance industry and appears to have landed a big victim in Aflac after compromising networks ...

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

Cybernews researchers reported that since the beginning of the year, they've detected 30 datasets containing 16 billion stolen credentials exposed on the internet, most of which had not been previously recorded and represent a massive trove of ...

AWS Raises Expertise Bar for MSSP Partners

Amazon Web Services (AWS) this week revealed it has added new categories for describing offerings provided by partners offering managed services security providers (MSSP) as part of an effort to ensure a more consistent customer experience. The ...

Will AI Replace You — or Promote You? How to Stay Ahead

What can public- and private-sector staff do to stay relevant and grow their career in the midst of AI-driven tech layoffs? Here’s a roundup of recent stories and solutions to help. The post Will AI Replace You — or Promote You? How to Stay ...

Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers unearth keyloggers on Outlook login pages Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of ...

Are Your Secrets Protected Against Data Breaches?

Are Your Secrets Well Guarded in the Name of Data Security? Have you ever pondered the magnitude of secrets protection in your organizational data security framework? Non-Human Identities (NHIs) and Secrets Security Management has proven to be a ...

How Secure Are Your Cloud-Based Non-Human Identities?

Are Your Cloud-Based Non-Human Identities as Secure as You Think They Are? We all want to believe that our cybersecurity measures are infallible. But in reality, our digital defense mechanisms – even those earmarked for cloud security – are ...

Why Being Proactive with NHIs Can Save Your Business

Why is NHI Management a Game Changer in Business Protection? Have you ever wondered how organizations manage to protect enormous amounts of data? An overlooked but vital component in data security is Non-Human Identities (NHIs). Through proactive ...

LinuxFest Northwest: The First Black Software Engineer in America: Technology and Race

Author/Presenter: Clyde Ford (Author And Software Consultant) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb ...

Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data

Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals. The post Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, ...

Hands-On with Amazon Inspector’s Latest Feature: Code Security

Seamlessly integrates with GitHub to automatically detect code vulnerabilities — perfect for developers new to static analysis.Continue reading on Medium »

Your passwords are everywhere: What the massive 16 billion login leak means for you

Security researchers discovered 16 billion stolen passwords from Apple, Google, Facebook and more. Unlike traditional hacks, malicious software infected millions of personal devices, secretly stealing every login. Here's what this means for your ...

SOC 2 vs SOC 3: Which Report Builds Public Trust?

Here at Ignyte, we talk a lot about the major governmental cybersecurity frameworks like FedRAMP and CMMC or the international framework ISO 27001. What we don’t talk about as much – but which is no less important – are smaller-scale or ...

The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive

The $4.88 million question isn't really whether organizations can afford to implement passwordless authentication—it's whether they can afford not to. With breach costs rising 10% annually, credential-based attacks representing the primary ...

How NHIs Can Handle Your Security Needs

Why Should Professionals Consider NHI for Security Needs? Is your organization exploring efficient ways to secure cloud environments? By leveraging comprehensive Non-Human Identities (NHIs), businesses can improve their cybersecurity posture ...

Justify Your Investment in Advanced NHIs

Is Your Investment in Advanced NHIs Justifiable? Investing in advanced Non-Human Identities (NHIs) is no longer a luxury, but a necessity for businesses, particularly those operating in the cloud. But how can you ensure that your hefty investment ...

Why Satisfied Teams Use Cloud Compliance Tools

How Does Cloud Compliance Translate Into Team Satisfaction? Are you worried about securing machine identities? Certainly, managing Non-Human Identities (NHIs) is a complex task that requires the right cybersecurity approach. However, its ...

Stay Relaxed with Robust IAM Solutions

Why do You Need Robust IAM Solutions? How secure are your organizational operations? Establishing a relaxed security management mindset requires a significant leap. The answer could lie in robust Identity and Access Management (IAM) solutions. ...

PCI DSS 4.0.1: What Changed and How is this the Next Step for Universal MFA

As the transition period for PCI DSS 4.0 draws to a close on March 31, 2025, PCI DSS 4.0.1 stands as the current version of the standard. More importantly, the March 31, 2025 deadline for full compliance with all new and customized PCI DSS 4.0 ...

Enterprise Kubernetes Explained: How to Leverage K8s Effectively

Enterprise Kubernetes management is at the heart of modern cloud-native strategies, enabling organizations to deploy, scale, and govern applications effectively. In 2025, enterprise Kubernetes has evolved into a critical platform for businesses ...