Application Security News and Articles


Is Your Secrets Management Foolproof?

How Secure Are Your Non-Human Identities? Have you ever wondered what it truly means to secure a machine identity? With technology ceaselessly permeates every aspect of our professional lives, the answer to this question becomes crucial, ...

Scaling NHIs in Fast-Growing Industries

How Can Organizations Effectively Leverage Scalable NHIs for Business Growth? Digital presents a myriad of challenges for businesses striving to maintain robust cloud security while fostering continued growth. Organizations frequently face the ...

Beyond SAST and DAST Tools: Using IAST to Pinpoint Exploitable Application Vulnerabilities

Software is the backbone of modern business, but it's also a major source of risk, with Mandiant's M-Trends 2025 report revealing that 33% of all breaches begin with a vulnerability exploit. For many developers and security teams, the constant ...

USENIX 2025: PEPR ’25 – Safetypedia: Crowdsourcing Privacy Inspections

Creators, Authors And Presenters: Lisa LeVasseur and Bryce Simpson, Internet Safety Labs Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. ...

Infotech Software Reviews Publishes Comprehensive CX Report on adam:ONE®

London ON – 3 October 2025 – Infotech Software Reviews, a leading independent authority on enterprise software, release of its in-depth Customer Experience (CX) Report on adam:ONE®, a revolutionary Zero Trust Connectivity (ZTC) security ...

Cybersecurity Concerns as Blockchain Lands in Global Finance

  The Society for Worldwide Interbank Financial Telecommunication (SWIFT) and over 30 banks servicing 200 countries, have announced they will develop a blockchain global shared digital ledger to support global payments. SWIFT will integrate the ...

Randall Munroe’s XKCD ‘’-Style Pizza”

via the <city>-pizza analysis, comic artistry & exceedingly low-humidity wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’-Style Pizza” appeared first on Security Boulevard.

USENIX 2025: PEPR ’25 – Demystifying The Android Telehealth Ecosystem

Creator, Author and Presenter: Primal Wijesekera, ICSI And UC Berkeley Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post ...

Asahi Hack Update: Beer-Free Day #5 Dawns in Japanese Ransomware Crisis

金のうんこ! Breaking: Big beer brewer belatedly believes bitten by ransomware—and likely a data breach. The post Asahi Hack Update: Beer-Free Day #5 Dawns in Japanese Ransomware Crisis appeared first on Security Boulevard.

Red Hat’s GitLab Breach and the Cost of Embedded Credentials

3 min readOpen-source software giant Red Hat has confirmed that one of its GitLab instances, dedicated to consulting engagements, was breached. The attackers, a group calling itself “Crimson Collective,” claim to have taken nearly 28,000 ...

How to Protect Your Business from Supply Chain Attacks: Lessons from the Salesforce Breach

A company's cybersecurity is only as strong as the weakest link in its supply chain. What was once a rare occurrence is now a top concern for businesses. Yes, we're talking about Supply Chain Attacks. In August 2025, a new supply chain attack ...

What a Rogue Package, a Ransomware Hit, and One Mistake Say About Cyber Risk Right Now

In September 2025, we saw a worm-style supply chain attack hit npm packages, a major ransomware incident in Brazil’s healthcare sector, an insider breach at a U.S. bank, and Cloudflare dealing with fallout from a vendor compromise. In this ...

Report Details Security Weakness in Comet AI Browser from Perplexity

A new LayerX report shows how a single malicious URL can exploit Perplexity’s Comet AI browser via prompt injection, potentially exposing sensitive data and connected applications. The post Report Details Security Weakness in Comet AI Browser ...

Navigating the European Union AI Act

What is the EU AI Act, how does it overlap with the GDPR, and how does it stand to impact developers building AI-driven software? We’ve got the answers. The post Navigating the European Union AI Act appeared first on Security Boulevard.

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

Other noteworthy stories that might have slipped under the radar: cybercriminals offer money to BBC journalist, LinkedIn user data will train AI, Tile tracker vulnerabilities. The post In Other News: PQC Adoption, New Android Spyware, FEMA Data ...

12 Questions to Ask Before Investing in a PAM Solution

Stolen identity and privileged access credentials account for 61% of all data breaches. And that number is growing year over year. Cybercrime groups, bad actors, and rogue insiders are now leveraging AI, making attacks faster, more targeted, and ...

North Korea Remote Worker Scam Goes Global, Expands Target Industries

A report by Okta researchers says the notorious North Korea IT worker scams, which have focused on U.S. tech and crypto firms, is now going global, targeting other industries like healthcare and finances in a growing number of countries that ...

Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New OT Security Guidelines Highlight Architecture Mapping

As we kick off Cybersecurity Awareness Month, AI security challenges take the spotlight. Meanwhile, new marching orders say OT security teams need a comprehensive view of their systems. And get the latest on post-quantum computing standards and ...

Oneleet Raises $33 Million for Security Compliance Platform

The cybersecurity startup will expand its engineering team, add more AI capabilities, and invest in go-to-market efforts. The post Oneleet Raises $33 Million for Security Compliance Platform appeared first on SecurityWeek.

Unauthenticated RCE Flaw Patched in DrayTek Routers

The security defect can be exploited remotely via crafted HTTP/S requests to a vulnerable device’s web user interface. The post Unauthenticated RCE Flaw Patched in DrayTek Routers appeared first on SecurityWeek.