Application Security News and Articles


How Smart NHI Solutions Enhance Security Measures

How Does NHI Management Revolutionize Security Frameworks? Have you ever wondered why securing machine identities is as critical as protecting human identities? Non-Human Identities (NHIs), such as machine or application identities, play an ...

Ensuring Scalability in Your NHI Security Practices

Why Should Non-Human Identities (NHIs) Be Your Next Security Focus? Have you considered how Non-Human Identities (NHIs) fit into your organization’s cybersecurity strategy? Where cloud computing is omnipresent, securing NHIs is not just an ...

Creating Stability in NHI Management Across Multiple Clouds

How Can Organizations Achieve Stability in Managing Non-Human Identities Across Multiple Clouds? Where technology rapidly evolves and security threats become increasingly sophisticated, how can organizations ensure stability when managing ...

Confidently Managing Your NHIs’ Security Posture

Why is Managing Non-Human Identities Crucial for Your Organization’s Security Posture? Digital is continually evolving, and with it comes the increasing reliance on non-human identities (NHIs) to automate and streamline processes across various ...

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. ...

NDSS 2025 – Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr ...

NDSS 2025 – A Holistic Security Analysis Of Google Fuchsia’s (And gVisor’s) Network Stack

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Inon Kaplan (Independent Researcher), Ron Even (Independent Researcher), Amit Klein (The Hebrew University Of Jerusalem, Israel) --- PAPER --- You Can Rand but You Can't ...

Unprecedented Automation: IndonesianFoods Pits Open Source Against Itself

Over the past year, we've seen a steady drumbeat of supply chain incidents targeting npm — each slightly different, but collectively pointing to the same truth: the open source ecosystem is being stress-tested in real time. The post ...

Using AI to Predict and Disrupt Evolving Cyberattacks

Rachel Jin, chief enterprise platform officer at Trend Micro, explains how multiple forms of artificial intelligence (AI) will be used to predict and disrupt cyberattacks even as they grow in volume and sophistication. As cyberattacks grow in ...

Operationalizing Threat Intelligence and AI-Powered Cyber Defense

Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations today struggle to turn ...

Survey Surfaces Sharp Rise in Cybersecurity Incidents Involving AI

A survey of 500 security practitioners and decision-makers across the United States and Europe published today finds cyberattacks aimed at artificial intelligence (AI) applications are rising, with prompt injections involving large language ...

Lion Safe-Zone

Hat Tip to Verification Labs :: Penetration Testing Specialists :: Trey Blalock GCTI, GWAPT, GCFA, GPEN, GPCS, GCPN, CRISC, CISA, CISM, CISSP, SSCP, CDPSE for recommending this highly entertaining security comic! Original H/T to the original post ...

Google adds Emerging Threats Center to speed detection and response

When a new vulnerability hits the news, security teams often scramble to find out if they are at risk. The process of answering that question can take days or weeks, involving manual research, rule-writing, and testing. Google Security Operations ...

China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

NTT’s chief cybersecurity strategist Mihoko Matsubara on the new geopolitics of hacking, the "chicken and egg" problem of 5G, and the AGI threat to society. The post China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief ...

UK’s new Cyber Security and Resilience Bill targets weak links in critical services

The UK government has introduced the Cyber Security and Resilience Bill, a major piece of legislation designed to boost the country’s protection against cyber threats. The new law aims to strengthen the digital defenses of essential public ...

NDSS 2025 – MALintent: Coverage Guided Intent Fuzzing Framework For Android

SESSION Session 2D: Android Security 1 Authors, Creators & Presenters: Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel (University of California, Santa Barbara), Giovanni ...

How TTP-based Defenses Outperform Traditional IoC Hunting

Behavioral detection allows defenders to recognize activity patterns like privilege escalation, credential theft, and lateral movement—often ahead of encryption or data exfiltration. The post How TTP-based Defenses Outperform Traditional IoC ...

Commvault Extends AI Ability to Ensure Cyber Resilience

Commvault today extended the reach and scope of its data protection portfolio as part of an effort to enable IT organizations to achieve and maintain resiliency. Announced at its SHIFT 2025 event, these additions are part of a Commvault Cloud ...

Securonix DPM Flex optimizes SIEM data management

Securonix announced of Data Pipeline Manager (DPM) with DPM Flex Consumption, a breakthrough in integrated SIEM data management that expands threat visibility, increases analytical coverage, and improves compliance assurance, all within the same ...

Commvault Cloud Unity platform delivers unified data security, recovery, and identity protection

Commvault has announced the Commvault Cloud Unity platform release. This next-generation, AI-enabled version of Commvault Cloud now unifies data security, cyber recovery, and identity resilience across cloud, SaaS, on-premises, and hybrid ...