Application Security News and Articles


Secure Coding : OWASP CHECKLIST

In the previous article, we discussed the importance of secure coding in the defense architecture of an application.Continue reading on Medium »

BSidesLV24 – Ground Truth – Reassessing 50k Vulnerabilities: Insights From SSVC Evaluations In Japan’s Largest Telco

Author/Presenter: Hirofumi Kawauchi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Understanding RTO/RPO & Why They’re Not Enough

The post Understanding RTO/RPO & Why They’re Not Enough appeared first on Votiro. The post Understanding RTO/RPO & Why They’re Not Enough appeared first on Security Boulevard.

44% of the zero-days exploited in 2024 were in enterprise solutions

In 2024, threat actors exploited 75 zero-days – i.e., vulnerabilities previously unknown to vendors, thus without a readily available patch – in a wide variety of attacks. Of these, 33 vulnerabilities (44%) affected enterprise ...

Proofpoint Leverages AI to Extend Scope of Cybersecurity Reach

Proofpoint has expanded its ability to thwart multistage cyberattacks spanning multiple communications channels while at the same time extending its reach into data security posture management (DSPM). The post Proofpoint Leverages AI to Extend ...

Are Puppies the New Booth Babes: What Do You Think?

Walking the floor of the RSA Conference (RSAC) this year, amid the sea of booths packed with flashing monitors, cybersecurity swag and endless sales pitches, one booth stood out — and not for its tech demos or zero-day revelations. Orca ...

Introducing One Security Token Service for All Your Clouds

7 min readSecuring non-human access should be easier – but federation is fragmented, manual, and brittle. We built a better way to do it across clouds. The post Introducing One Security Token Service for All Your Clouds appeared first on ...

How do You Know if You’re Ready for a Red Team Partnership?

Before engaging in a full-scope exercise, it’s important to assess whether your program, people and processes are truly ready.  The post How do You Know if You’re Ready for a Red Team Partnership? appeared first on SecurityWeek.

Introducing Mend’s Integration with Microsoft Defender for Cloud

Mend.io now integrates with Microsoft Defender for Cloud, bringing intelligent open source security insights into cloud workflows. The post Introducing Mend’s Integration with Microsoft Defender for Cloud appeared first on Security Boulevard.

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

San Francisco, United States, 29th April 2025, CyberNewsWire The post SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI appeared first on Security Boulevard.

SentinelOne’s Purple AI Athena Brings Autonomous Decision-Making to the SOC

Athena marks a major leap in SOC automation, enabling real-time detection, triage, and remediation with minimal human oversight. The post SentinelOne’s Purple AI Athena Brings Autonomous Decision-Making to the SOC appeared first on ...

WarGames – it’s not 1983 anymore

China’s state-sponsored cyber operations, driven by groups like Volt Typhoon, Salt Typhoon, Brass Typhoon, and APT41, and amplified by techniques like Fast Flux DNS, are not chasing Hollywood apocalypse—they’re seizing America’s networks, ...

Getting Physical with Cybersecurity

LAS VEGAS – Security doors and cameras, alarms and biometrics, smart locks and drones, were some of the security device types on display at ISCWest (International Security Consortium West) 2025 at the Venetian Hotel in April. Many of these ...

China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America

As Xi Jinping advances his vision for China’s dominance by 2049, cybersecurity experts warn that connected technologies—like EV batteries—may quietly serve as tools of influence, espionage, and disruption. The post China’s Secret ...

BSidesLV24 – Ground Truth – Defensive Counting: How To Quantify ICS Exposure On The Internet When The Data Is Out To Get You

Author/Presenter: Emily Austin Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

HPE Extends Scope of Cybersecurity Reach Across Multiple Platforms

Hewlett Packard Enterprise (HPE) at the 2025 RSA Conference today added a series of controls for users, devices and applications to its cloud-based network management platform that promise to make it simpler for organizations to enforce ...

A Look Into the Secrets of MCP: The New Secret Leak Source

MCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks ...

RSAC Fireside Chat: Shift left, think forward — why MDR is emerging as cyber’s silver bullet

With RSAC kicking off next week, the conversation is shifting—literally. Cybersecurity pros are rethinking how “shift left” applies not just to code, but to enterprise risk. Related: Making sense of threat detection In this Fireside Chat, I ...

Bitwarden Access Intelligence defends against credential risks and phishing

Bitwarden launched Access Intelligence, a set of new capabilities that enables enterprises to proactively defend against internal credential risks and external phishing threats. Access Intelligence introduces two core functionalities: Risk ...

ExtraHop strenghtens network detection and response

ExtraHop launched all-in-one sensor designed to unify network traffic collection that scales across a number of security use cases. This further advances ExtraHop’s vision to consolidate NDR, network performance monitoring (NPM), intrusion ...