Application Security News and Articles


Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts

Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick users into giving them access to their M365 ...

NCC Group Taps Qualys to Extend Managed Security Service into Shadow IT Realm

NCC Group this week revealed it has allied with Qualys to expand the scope of its managed attack surface management (ASM) services to address instances of shadow IT. Amber Mitchell, lead product manager for ASM at NCC Group, said the managed ...

4 Pillars of Network Risk Reduction: A Guide to Network Security Risk Management

Large enterprises today find themselves stuck in the “messy middle” of digital transformation, managing legacy on-premise firewalls from Palo Alto, Check Point, and Fortinet while simultaneously governing fast-growing cloud ...

NIS2 Compliance: Maintaining Credential Security

Strengthen NIS2 compliance by preventing weak and compromised passwords with Enzoic's continuous credential protection. The post NIS2 Compliance: Maintaining Credential Security appeared first on Security Boulevard.

NDSS 2025 – Interventional Root Cause Analysis Of Failures In Multi-Sensor Fusion Perception Systems

Session 6C: Sensor Attacks Authors, Creators & Presenters: Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City ...

Thailand Conference Launches International Initiative to Fight Online Scams

Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference. The post Thailand Conference Launches International Initiative to Fight Online Scams ...

Preventing This Week’s AWS Cryptomining Attacks: Why Detection Fails and Permissions Matter

The recent discovery of a cryptomining campaign targeting Amazon compute resources highlights a critical gap in traditional cloud defense. Attackers are bypassing perimeter defenses by leveraging compromised credentials to execute legitimate but ...

Vulnerability Management’s New Mandate: Remediate What’s Real

Live from AWS re:Invent, Snir Ben Shimol makes the case that vulnerability management is at an inflection point: visibility is no longer the differentiator—remediation is. Organizations have spent two decades getting better at scanning, ...

Randall Munroe’s XKCD ‘Fifteen Years’

via the insightful artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Fifteen Years’ appeared first on Security Boulevard.

Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread

Amazon is warning organizations that a North Korean effort to impersonate IT workers is more extensive than many cybersecurity teams may realize after discovering the cloud service provider was also victimized. A North Korean imposter was ...

Google Shutting Down Dark Web Report Met with Mixed Reactions

Google is shutting down its dark web report tool, which was released in 2023 to alert users when their information was found available on the darknet. However, while the report sent alerts, Google said users found it didn't give them next steps ...

Why AppSec Can’t Keep Up With AI-Generated Code

StackHawk co-founder and CSO Scott Gerlach has spent most of his career running security teams, and his take on application security is shaped by a simple reality: developers are still too often the last to know when their code ships with risk. ...

For $18 an Hour Stanford’s AI Agent Bested Most Human Pen Testers in Study 

A Stanford study finds the ARTEMIS AI agent beat most human pen testers in vulnerability discovery—at a fraction of the cost. The post For $18 an Hour Stanford’s AI Agent Bested Most Human Pen Testers in Study  appeared first on Security ...

In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee

Other noteworthy stories that might have slipped under the radar: Trump could use private firms for cyber offensive, China threat to US power grid, RaccoonO365 suspect arrested in Nigeria. The post In Other News: Docker AI Attack, Google Sues ...

NDSS 2025 – PowerRadio: Manipulate Sensor Measurement Via Power GND Radiation

Session 6C: Sensor Attacks Authors, Creators & Presenters: Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang (Zhejiang University), Chenren Xu (Peking University), Wenyuan Xu ...

Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal

The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models. The post Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal appeared ...

AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding

The startup’s solution captures, verifies, and governs all AI interactions within an enterprise’s environment. The post AI Security Firm Ciphero Emerges From Stealth With $2.5 Million in Funding appeared first on SecurityWeek.

Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility

Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability. The post Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility appeared first ...

CSA Study: Mature AI Governance Translates Into Responsible AI Adoption

New CSA research shows mature AI governance accelerates responsible AI adoption, boosts security confidence, and enables agentic AI at scale. The post CSA Study: Mature AI Governance Translates Into Responsible AI Adoption appeared first on ...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm ...