Application Security News and Articles


U.S., International Partners Target Bulletproof Hosting Services

Agencies with the US and other countries have gone hard after bulletproof hosting services providers this month, including Media Land, Hypercore, and associated companies and individuals, while the FiveEyes threat intelligence alliance published ...

Salesforce: Some Customer Data Accessed via Gainsight Breach

An attack on the app of CRM platform-provider Gainsight led to the data of hundreds of Salesforce customers being compromised, highlighting the ongoing threats posed by third-party software in SaaS environments and illustrating how one data ...

Saturday Security: Zero-Day Logitech Breach Exposes 1.8TB of Data

Logitech, a prominent PC accessories brand, has recently confirmed a major data breach after cybercriminals exploited a zero-day vulnerability in a third-party platform. While Logitech assures that exposed data was limited and credit card ...

NDSS 2025 – Explanation As A Watermark

SESSION Session 3D: AI Safety ----------- ----------- Authors, Creators & Presenters: Shuo Shao (Zhejiang University), Yiming Li (Zhejiang University), Hongwei Yao (Zhejiang University), Yiling He (Zhejiang University), Zhan Qin (Zhejiang ...

Making A Cyber Crisis Plan! Key Components Not To Be Missed

Do you think cyberattacks are headlines anymore? Given the frequent occurrences, it has turned headlines into a day-to-day reality, and that’s scarier! Organizations that are big names to small organizations that are still growing, every one of ...

The Security Landscape of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of ...

MY TAKE: Carol Sturka declares ‘I have agency!’ — Big Tech’s AI models now testing that claim

It was a tense moment in Episode 4 of Pluribus, the Apple TV series about a world linked by a single intelligence. Related: Mistaking pattern mastery for wisdom A character named Carol Sturka, surrounded by a seemingly benevolent collective … ...

What makes NHIs support systems more secure

How Do Non-Human Identities Transform Security Frameworks? How can organizations maneuver to ensure their support systems remain impenetrable? The answer lies in Non-Human Identities (NHIs). While more businesses migrate to cloud-based ...

How NHIs are tailored to handle specific enterprise needs

Are Non-Human Identities (NHIs) the Missing Piece in Your Enterprise’s Cybersecurity Strategy? Organizations are increasingly reliant on Non-Human Identities (NHIs) for managing security and access needs. But how exactly do NHIs address ...

How can I ensure secure interactions between Agentic AI systems?

What Are Non-Human Identities in Cybersecurity, and How Can They Be Managed? How can organizations ensure robust security for their machine identities, commonly known as Non-Human Identities (NHIs)? These identities are critical in protecting ...

Are AI security measures getting better annually

How Can Organizations Ensure the Security of Non-Human Identities in the Cloud? How do organizations manage the security of machine identities and secrets? This question is at the forefront for companies across industries such as financial ...

SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO

The SEC dismissed the remain charges in the lawsuit filed in 2023 against software maker SolarWinds and CISO Timothy Brown in the wake of the massive Sunburst supply chain attack, in which a Russian nation-state group installed a malicious update ...

Security Is Fragmenting and Converging at the Same Time — Insights from the Field

Over the past weeks, I’ve had a series of conversations across the cybersecurity ecosystem. Founders in early-stage security startups, VC firms exploring new segments, PE groups accelerating roll-ups, MSP leaders navigating change, and friends ...

What is Multi-Site Certification for ISO 27001?

ISO 27001 is a very useful certification for just about any company operating abroad. Comparable in many ways to NIST-based frameworks like CMMC in the United States, ISO 27001 is an international standard built to help organizations of all ...

NDSS 2025 – THEMIS: Regulating Textual Inversion For Personalized Concept Censorship

SESSION Session 3D: Al Safety ----------- ----------- Authors, Creators & Presenters: Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore), ...

More on Rewiring Democracy

It’s been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good. Some of the book’s forty-three chapters are available online: chapters 2, 12, 28, ...

Randall Munroe’s XKCD ‘’Document Forgery”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Document Forgery” appeared first on Security Boulevard.

LLM09: Misinformation – FireTail Blog

Nov 21, 2025 - Lina Romero - In 2025, Artificial Intelligence is everywhere, and so are AI vulnerabilities. In fact, according to our research, these vulnerabilities are up across the board. The OWASP Top 10 list of Risks to LLMs can help teams ...

State of Cybersecurity 2025 for USA MSPs/MSSPs: Challenges, Threats, and the Seceon Platform Solution

Introduction: The Cybersecurity Crisis for Service Providers The landscape of cybersecurity for USA Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) in 2025 is defined by unprecedented complexity, operational ...

NDSS 2025 – A Key-Driven Framework For Identity-Preserving Face Anonymization

SESSION Session 3D: Al Safety ----------- ----------- Authors, Creators & Presenters: Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai ...