Application Security News and Articles


Staying Ahead with Proactive Secrets Rotation

Why Should Organizations Prioritize Proactive Secrets Rotation? Where digital connectivity is ever-increasing, how can organizations stay one step ahead? One answer lies in proactive secrets rotation – a strategy that is pivotal to maintaining ...

BSidesLV24 – Common Ground – One Port to Serve Them All – Google GCP Cloud Shell Abuse

Author/Presenter: Hubert Lin Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

What is COMSEC? Training, Updates, Audits & More

Here at Ignyte, we talk a lot about various overarching information security frameworks, like FedRAMP, CMMC, and ISO 27001. Within these overall frameworks exist a range of smaller and narrower standards, including COMSEC. If you’ve seen COMSEC ...

Why I Joined Grip Security in Securing the Digital Future

Join Grip Security on its mission to redefine identity security. Discover how innovation, empathy, and culture are shaping the future of digital protection. The post Why I Joined Grip Security in Securing the Digital Future appeared first on ...

The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise. The post The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools appeared ...

5 reasons to not miss Sonatype at RSAC 2025

RSA Conference (RSAC) brings together cybersecurity practitioners from across the globe to learn about the latest cybersecurity defense strategies and tools, connect with industry peers, and share knowledge about the threat landscape. The post 5 ...

CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability

Proof-of-concept code has been released after researchers disclosed a maximum severity remote code execution vulnerability in Erlang/OTP SSH. Successful exploitation could allow for complete takeover of affected devices. Background On April 16, ...

BSidesLV24 – Common Ground – Beyond Whack-a-Mole: Scaling Vulnerability Management by Embracing Automation

Author/Presenter: Yotam Perkal Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

The Zoom attack you didn’t see coming

Did you know that when participating in a Zoom call, you can grant permission to other participants to control your computer remotely? While this feature may come in handy when dealing with trusted family, friends and colleagues, threat actors ...

Krebs Steps Down from SentinelOne, Vows to Fight Trump Attack

Chris Kreb, the former CISA director who has come under fire from President Trump for refusing to support claims at the 2020 election was tampered with, resigned from his position with cybersecurity vendor SentinelOne, telling employees that ...

White-Labeled XDR Platform

What is a White-Labeled XDR Platform? XDR stands for Extended Detection and Response — a security solution that integrates multiple security layers (endpoint, network, server, cloud, and more) into a unified system. It provides end-to-end ...

The Enterprise-Ready Dilemma: Navigating Authentication Challenges in B2B SaaS

Authentication issues block 75% of enterprise SaaS deals, with companies losing millions in revenue annually. This deep dive reveals how forward-thinking SaaS leaders transform auth from a technical headache into a strategic advantage to ...

ATLSecCon 2025: Security Readiness Means Human Readiness

LLMs won’t fix a broken SOC, but apprenticeship might. ATLSecCon 2025 revealed how outdated hiring and cultural gatekeeping are breaking cybersecurity from the inside out. The post ATLSecCon 2025: Security Readiness Means Human Readiness ...

Don’t Let Fear Stop You from Innovating or Launching a Startup Business

Fear is one of the greatest barriers to innovation and entrepreneurship. The fear of failure. The fear of imperfection. The fear of not having the...Read More The post Don’t Let Fear Stop You from Innovating or Launching a Startup Business ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/18/25

Insight No. 1 — CVE program’s near-death exposes security's single point of failure The recent near-halt of the CVE program due to funding issues highlights a critical vulnerability in our industry's reliance on single points of failure. ...

Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators

Check out NIST’s effort to further mesh its privacy and cyber frameworks. Plus, learn why code-writing GenAI tools can put developers at risk of package-confusion attacks. Also, find out what Tenable webinar attendees said about identity ...

Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)

CVE-2021-20035, an old vulnerability affecting Sonicwall Secure Mobile Access (SMA) 100 series appliances, is being exploited by attackers. Sonicwall confirmed it by updating the original security advisory to reflect the new state of play, and by ...

In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged

Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US. The post In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin ...

Cy4Data Labs Raises $10 Million to Secure Data in Use

Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners. The post Cy4Data Labs Raises $10 Million to Secure Data in Use appeared first on SecurityWeek.

Live Events Giant Legends International Hacked

Legends International says the personal information of employees and customers was compromised as a result of a cyberattack. The post Live Events Giant Legends International Hacked appeared first on SecurityWeek.