Application Security News and Articles


How Proxy Servers Enhance Security in Modern Authentication Systems

Learn how proxy servers enhance authentication security by filtering traffic, supporting MFA, enabling Zero Trust, and protecting against cyber threats. The post How Proxy Servers Enhance Security in Modern Authentication Systems appeared first ...

Top IT Asset Management Companies

Discover the top IT asset management companies of 2025. Compare Alloy, ServiceNow, Ivanti, Freshworks, and SysAid to find the best ITAM solution for your business. The post Top IT Asset Management Companies appeared first on Security Boulevard.

Dependency-Track: Open-source component analysis platform

Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles that problem head-on. Rather than treating software composition as a ...

DDoS, data theft, and malware are storming the gaming industry

When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More players meant more logins, payments, and personal data. That created a ...

AI writes code like a junior dev, and security is feeling it

The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army of Juniors: The AI Code Security Crisis report show that AI-generated code often appears clean and ...

Product showcase: Neo Network Utility makes network checks simple

Want to see if a remote server is still alive, or trace the path your data takes across the internet? Network Utility had you covered, until Apple removed it. Network Utility was the go-to macOS app for quick network checks. It gave you a ...

It’s Always DNS: Lessons from the AWS Outage

In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity ...

Are Facial Recognition and Passkeys the Same? Exploring Key Concepts

Explore the key differences between facial recognition and passkeys for authentication. Understand their unique concepts, security implications, and use cases in software development. The post Are Facial Recognition and Passkeys the Same? ...

Single Sign-On (SSO): Simplifying User Authentication

Discover how Single Sign-On (SSO) simplifies user authentication, enhances security, and reduces IT overhead. Learn about SSO protocols, implementation strategies, and security best practices. The post Single Sign-On (SSO): Simplifying User ...

Build Confidence with Robust Secrets Management

How Does Effective Secrets Management Enhance Robust Security? Have you ever considered the impact of non-human identities in your organization’s security framework? While human factors in cybersecurity get a lot of attention, it’s ...

Scaling Identity Security in Cloud Environments

How Can Organizations Achieve Scalable Security in Cloud Environments? The increasing reliance on cloud environments means organizations face an unprecedented need for scalable security solutions. One of the more complex challenges is managing ...

Empowering Teams with Better Access Management

How Can Access Management Revolutionize Team Empowerment? What if the key to unlocking your team’s full potential lies in how you manage access to your digital assets? The effective management of Non-Human Identities (NHIs) is not just a ...

NDSS 2025 – Oreo: Protecting ASLR Against Micro-Architectural Attacks

Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan (Massachusetts Institute of Technology) PAPER Oreo: Protecting ASLR Against ...

NDSS 2025 – Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth

Authors, Creators & Presenters: Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz Buhl (Technical University of Munich), Jens Grossklags (Technical University of ...

Cyber Awareness Month: Protecting Your Child in the Digital Age

How can you be a cyber-smart parent? In this interview with Chad Rychlewski, the co-author of a new book, we unpack what family online protection looks like in 2025.   The post Cyber Awareness Month: Protecting Your Child in the Digital Age ...

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks the wrong way Most research on LLM privacy has focused on the wrong problem, according to a new paper by ...

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension…

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension campaign Short read for everyone: we found a malicious Chrome extension that stole login data from a crypto trading site. Tracing the domain it talked to ...

How Secure Are Your Machine Identities?

How Effective Is Your Non-Human Identity Management? Are your data security strategies truly effective in safeguarding machine identities within your organization’s cloud infrastructure? Where businesses increasingly rely on machine ...

NDSS 2025 – CHAOS: Exploiting Station Time Synchronization In 802.11 Networks Session 1A: WiFi and Bluetooth Security

Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER - CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially in urban areas, are quite noisy with ...

$1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal

WhatsApp told SecurityWeek that the two low-impact vulnerabilities cannot be used for arbitrary code execution.  The post $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal appeared first on SecurityWeek.