Application Security News and Articles


Week in review: WatchGuard Firebox firewalls attacked, infosec enthusiasts targeted with fake PoCs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Building cyber talent through competition, residency, and real-world immersion In this Help Net Security interview, Chrisma Jackson, Director of ...

How impenetrable are secrets vaulting solutions

How Are Non-Human Identities Changing the Cybersecurity Landscape? What if the biggest vulnerability in your cybersecurity strategy was not a human error but a machine identity left unchecked? Secrets vaulting solutions are increasingly seen as ...

Are current PAM solutions capable of handling NHIs

How Secure Are Your Non-Human Identities? Have you ever wondered how well your organization handles Non-Human Identities (NHIs) within your cybersecurity framework? With technology progresses, so does the complexity of managing machine identities ...

What does a free to implement AI compliance strategy look like

How Can Organizations Implement a Free AI Compliance Strategy Effectively? Are you fully prepared to leverage AI while remaining compliant with regulations? Where enterprises increasingly rely on artificial intelligence, maintaining compliance ...

NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP

Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany ...

What “Verified Identity Data” Means for APIs — and How to Evaluate a Data Partner

If you’re building fraud prevention, risk scoring, or identity enrichment into a product, your outcomes depend on one thing: the quality of your identity data. A lot of identity data on the market is broad but unverified: raw broker feeds, ...

Inside the Biggest Cyber Attacks of 2025

2025 has emerged as one of the most disruptive years for cybersecurity, marked by unprecedented breach volumes, record-breaking credential leaks, and cascading supply-chain failures. Across just 12 months, cyber incidents have impacted ...

Friday Squid Blogging: Squid Camouflage

New research: Abstract: Coleoid cephalopods have the most elaborate camouflage system in the animal kingdom. This enables them to hide from or deceive both predators and prey. Most studies have focused on benthic species of octopus and ...

What makes an AI system smart in managing secrets

How Does a Smart AI System Enhance Managing Secrets in Cybersecurity? Have you ever wondered how a smart AI system revolutionizes the way we manage secrets in cybersecurity? The evolution of technology is as thrilling as it is vital, especially ...

How can secrets security fit within a tight IT budget

Are Non-Human Identities the Missing Piece in Your Cybersecurity Strategy? How often do we consider the importance of non-human identities (NHIs)? These machine identities are increasingly at the forefront of security strategies, especially for ...

How to stay ahead in managing NHIs effectively

Are you effectively addressing the cybersecurity challenges associated with Non-Human Identities (NHIs)? The management of Non-Human Identities (NHIs) has become a critical aspect of cybersecurity strategies. NHIs, or machine identities, are ...

Can cloud compliance make tech leaders feel more relaxed

How Can Effective NHI Management Contribute to Cloud Compliance? Have you ever wondered how the seamless integration of Non-Human Identities (NHIs) and Secrets Security Management can significantly enhance cloud compliance and make tech leaders ...

NDSS 2025 – A Formal Approach To Multi-Layered Privileges For Enclaves

Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Ganxiana Yana (Shanghai Jiao Tona Universitv). Chenvana Liu (Shanghai Jiao Tong Universitv). Zhen Huana (Shanghai Jiao Tona Universitv). Guoxina Chen (Shanghail ...

TDL 012 | The Architect of the Internet on the Future of Trust

Summary In this episode of The Defenders Log, Paul Mockapetris, the architect of DNS, discusses the evolving role of the Domain Name System from a simple directory to a sophisticated security tool. He posits that modern networking requires ...

Randall Munroe’s XKCD ‘Bridge Clearance’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bridge Clearance’ appeared first on Security Boulevard.

NDSS 2025 – SCRUTINIZER: Towards Secure Forensics On Compromised TrustZone

Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University), Fengwei Zhang (Southern University of Science and Technology), ...

Best of 2025: Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access

A survey of 1,942 IT and IT security practitioners finds nearly half (47%) work for organizations that have experienced a data breach or cyberattack in the past 12 months that involved a third-party that has access to their network. The post Best ...

Best of 2025: Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’

Classic “wordplay:” Larry’s PR angels desperately dance on the head of a pin. The post Best of 2025: Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’ appeared first on Security Boulevard.

Cybersecurity Snapshot: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics

In this special year-end edition, we revisit critical advice from our cybersecurity experts on AI, exposure management, cloud, vulnerability management, OT, and critical infrastructure. Key takeaways Combating AI threats: Counter autonomous ...

Why AI-Native Products Create Compounding Returns, Not One-Time Wins

If your AI investment needs constant justification, it’s already in trouble. One-time productivity bumps don’t move margins. Demos don’t survive budget reviews. And “AI adoption”...Read More The post Why AI-Native Products Create ...