Application Security News and Articles


Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft’s new AI agents take on phishing, patching, alert fatigue Microsoft is rolling out a new generation of AI agents in Security ...

From checkbox to confidence: Why passing the audit isn’t the endgame

“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar – or worse, relatable – it’s time for a serious look in the mirror. Every year, companies across industries breathe a collective sigh of relief when the ...

Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms 

In 2023, a massive data breach at 23andMe shook the foundation of the consumer genomics industry. Fast forward to today, the company has filed for bankruptcy. From Veriti’s perspective, this incident highlights the devastating consequences of ...

What are the cost implications of maintaining NHI compliance?

Does Non-Human Identities Compliance Come with a Hefty Price Tag? Foremost among these challenges is securing a cloud environment from potential threats. One of the most significant components of this effort is the effective management of ...

What best practices ensure long-term compliance for NHIs?

What Are the Essential Considerations for Long-Term Compliance of Non-Human Identities? The importance of Non-Human Identities (NHIs) in cybersecurity cannot be overstated. But how do organizations ensure the long-term compliance of these NHIs? ...

How can technology simplify the process of NHI compliance?

How is Technology Revolutionizing Non-Human Identities (NHI) Compliance? How can the integration of advanced technology streamline the process of NHI compliance? A robust cybersecurity strategy is indispensable, especially regarding the ...

BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do?

Author/Presenter: Josh Corman, Aanne Isam Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation

Overview of Babuk Locker 2.0 Babuk Locker 2.0 is a ransomware strain that employs double extortion, where attackers encrypt victim files and exfiltrate sensitive data for ransom. It targets organizations by exploiting RDP vulnerabilities, ...

News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus

Palo Alto, Calif., Mar 28, 2025, CyberNewswire — From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ...

Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience

In this edition of Axio’s Executive Insight Series, Scott Kannry, CEO of Axio, sits down with Pierre Noel, former CISO of Microsoft Asia and Huawei, to discuss the evolution of Read More The post Executive Perspectives: Pierre Noel on ...

PCI DSS 4.0: Achieve Compliance with Feroot Before March 31

The post PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 appeared first on Feroot Security. The post PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 appeared first on Security Boulevard.

Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity

Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity Building Smarter, Safer Businesses: How SecureFLO is Bridging AI Innovation with Cybersecurity In today’s fast-evolving digital landscape, businesses ...

Cybersecurity & Infrastructure Security Agency (CISA) Pledge

When the Cybersecurity and Infrastructure Security Agency (CISA) introduced the Secure by Design pledge in May of last year, it immediately resonated with our engineering philosophy;   it was a natural fit, not a shift. Thanks to our highly ...

How do I update policies to incorporate NHIs effectively?

Why Give Importance to Updating Policies for Non-Human Identities? Have you contemplated how securing your organization’s digital goes beyond protecting human identities alone? Consider this: a significant part of digital ecosystem consists of ...

What are the common pitfalls in managing NHI compliance?

What Really Goes Into Managing Non-Human Identities Compliance? When it comes to securing cloud environments, have we been overlooking a crucial aspect? What if our focus needs to shift beyond just human identities and encompass machine ...

How can automated tools improve NHI compliance monitoring?

How Significant is Automated Non-Human Identities Compliance Monitoring? What if we told you that automated Non-Human Identities (NHIs) compliance monitoring could be the game-changer in staving off security breaches in your organization? The ...

Oracle Hack PR Drama: Deny, Deny, Deny — Despite Damning Data

OCI dokey then: Larry Ellison’s PR pukes desperately follow the script. The post Oracle Hack PR Drama: Deny, Deny, Deny — Despite Damning Data appeared first on Security Boulevard.

Static Application Security Testing SAST Series: Part 1

Path ManipulationContinue reading on Medium »

BSidesLV24 – IATC – Cybersec And Ai Risk Management Challenges For The Next Generation Of Public Safety Systems

Authors/Presenters: Raymond Sheh Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Why SAST is a Must-Have Skill for AppSec Professionals!

👋 Hello, Fellow AppSec Engineers! I’m Sahil Dari, an AppSec Engineer with 4 years of experience in Web App Security, API Security, Secure…Continue reading on Medium »