Application Security News and Articles


Sleep Soundly Knowing Your NHIs are Managed Well

Are Your Non-Human Identities Fully Protected? Managing Non-Human Identities (NHIs) has become critical, with organizations relying heavily on machine identities to perform essential tasks. But are these identities adequately managed and ...

How Good IAM Support Bolsters Your Security Posture

What Are Non-Human Identities, and Why Do They Matter in Cybersecurity? Have you ever considered how machine identities could impact the security framework of an organization? Non-Human Identities (NHIs) are the often-overlooked components of ...

USENIX 2025: PEPR ’25 – Establishing Privacy Metrics For Genomic Data Analysis

Creator, Author and Presenter: Curtis Mitchell, xD, United States Census Bureau Additional Authors: Gary Howarth And Justin Wagner, NIST; Jess Stahl, Census; Christine Task And Karan Bhagat, Knexus; Amy Hilla And Rebecca Steinberg, MITRE Our ...

‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH

Strange factors: Yet another security problem plaguing SonicWall customers. The post ‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH appeared first on Security Boulevard.

Tonic Textual on Microsoft Fabric: Now in private preview

Tonic Textual is now available in private preview on Microsoft Fabric, enabling teams to de-identify sensitive text and documents directly in their Lakehouse. This integration empowers enterprises to unlock AI-ready datasets while ensuring ...

Microsoft Sniffs Out AI-Based Phishing Campaign Using Its AI-Based Tools

Microsoft used AI-based tools in Defender for Office 365 to detect and block a phishing campaign in which Security Copilot determined the malicious code was likely written by a LLM, marking the latest incident in which AI security tools were used ...

Randall Munroe’s XKCD ‘’Biology Department”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Biology Department” appeared first on Security Boulevard.

Akira ransomware: From SonicWall VPN login to encryption in under four hours

Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their systems, Arctic Wolf researchers have warned. Armed with SonicWall SSL VPN credentials stolen in earlier ...

USENIX 2025: PEPR ’25 – My $5MM Differential Privacy Visualizations

Creator, Author and Presenter: Marc-Antoine Paré Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ...

African Authorities Arrest 260 Suspects in Romance, Sextortion Scams

Authorities in 14 African countries arrested 260 people, seized 1,235 electronic devices, and took down 18 criminal infrastructures in a sprawling Interpol operation aimed at the growing global problem of romance and sextortion scams being run ...

NowSecure Privacy helps organizations protect mobile apps from data leaks

NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that ...

How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM

Let's have a look at how to integrate NHI Governance with AWS IAM to get detailed security insights into your dashboard. The post How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM appeared first on Security Boulevard.

CMMC Compliance: What Your Need to Know Ahead of November 10

The November 10th deadline for Cybersecurity Maturity Model Certification (CMMC) compliance is approaching fast. For CISOs, risk managers, and compliance leaders across the defense industrial base, this date represents more than a regulatory ...

Cybersecurity Alert Overload is a CEO’s Problem; Here’s How to Fix It

In today's digital landscape, organizations face an unprecedented volume of cybersecurity alerts on a daily basis. While these alerts are crucial for maintaining security, their sheer volume can overwhelm security teams, a phenomenon known as ...

Abusing Notion’s AI Agent for Data Theft

Notion just released version 3.0, complete with AI agents. Because the system contains Simon Willson’s lethal trifecta, it’s vulnerable to data theft though prompt injection. First, the trifecta: The lethal trifecta of capabilities ...

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

The government has announced a support package, but a cybersecurity expert has raised some concerns. The post Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention appeared first on SecurityWeek.

ISHIR: Big Enough to Scale, Small Enough to Care

In today’s fast-moving digital world, businesses need partners who can scale with them without losing the human touch. At ISHIR, we’ve built a model that...Read More The post ISHIR: Big Enough to Scale, Small Enough to Care appeared first on ...

SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding

Co-founder Hector Monsegur, formerly known as “Sabu,” a black hat hacker and leader of LulzSec, now serves as SafeHill’s chief research officer. The post SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding appeared first on ...

Dutch Teens Arrested for Allegedly Helping Russian Hackers

One of the two 17-year-old boys allegedly walked by law enforcement and embassy offices carrying a Wi-Fi sniffer. The post Dutch Teens Arrested for Allegedly Helping Russian Hackers appeared first on SecurityWeek.

25 Recent Cyber Attacks That Serve as a Wake-Up Call for Businesses

Cyberattacks in 2025 have hit airlines, automakers, banks, and even city services, causing major disruptions and exposing sensitive data. These incidents show how businesses across every sector remain prime targets. Here are 25 recent cases that ...