Application Security News and Articles


The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon 

Identity, not endpoints, is today’s attack surface. Learn why SharePoint and AI assistants like Copilot expose hidden risks legacy IGA can’t control. The post The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon  appeared ...

Building a healthcare cybersecurity strategy that works

In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network ...

AI-generated images have a problem of credibility, not creativity

GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada examined watermarking as a way to tag AI images so origin and integrity ...

The five-minute guide to OT cyber resilience

In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote access points, supply chain connections, and the need for specialized ...

When hackers hit, patient safety takes the fall

93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The study found that most of these attacks involved cloud account compromises, ...

Attackers don’t linger, they strike and move on

Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they gain access, aiming to run their payloads and get results before ...

Our APWG eCrimes Paper on Tech Support Scam Facebook Groups

My colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share "Crime-as-a-Service" offerings with one another. In our paper, ...

Empowering Teams with Efficient Secrets Rotation

How Can Efficient Secrets Rotation Empower Your Cybersecurity Team? How can organizations ensure the security of machine identities and secrets while maintaining team efficiency? The management of Non-Human Identities (NHIs), an often ...

How Reassured Are You by Your Cloud Compliance?

The Vital Role of Non-Human Identities in Cloud Compliance What makes cloud compliance an intricate challenge for modern enterprises? With digital transformation accelerates, businesses across various sectors face the critical task of ensuring ...

Driving Innovation with Secure NHIs

How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing ...

NDSS 2025 – Keynote 2: Towards Resilient Systems In An Increasingly Hostile World

Author, Creator & Presenter: Dr. Kathleen Fisher PhD, Director, Information Innovation Office (I2O), US Defense Advanced Research Projects Agency (DARPA) Our thanks to the Network and Distributed System Security (NDSS) Symposium for ...

Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)

Oracle has revealed the existence of yet another remotely exploitable Oracle E-Business Suite vulnerability (CVE-2025-61884). About CVE-2025-61884 CVE-2025-61884 is a vulnerability in the Runtime user interface in the Oracle Configurator product ...

Revisiting CISA Priorities for FY2026 and Beyond

The Cybersecurity and Infrastructure Security Agency is under new leadership and focus as we enter FY2026. So what are the priorities for the coming year? The post Revisiting CISA Priorities for FY2026 and Beyond appeared first on Security Boulevard.

Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from bug bounty programs without wasting money The wrong bug bounty strategy can flood your team with low-value ...

Building an Effective DDoS Mitigation Strategy That Works

Every organization’s DDoS mitigation strategy should reflect its unique architecture, defense technologies, and business priorities. Yet, after conducting more than 1,500 DDoS attack simulations and consulting engagements with companies of all ...

Is Your Spend on Cloud Security Justified?

How Secure Are Your Non-Human Identities? Have you ever considered how secure your non-human identities are? Safeguarding Non-Human Identities (NHI) is paramount, particularly where organizations increasingly shift operations to the cloud. ...

NDSS 2025 – Keynote 1: Quantum Security Unleashed: A New Era for Secure Communications and Systems

Author, Creator & Presenter: Dr. Johanna Sepúlveda PhD, Senior Expert and Technical Domain Manager for Quantum and Quantum-Secure Technologies, Airbus Defence and Space Our thanks to the Network and Distributed System Security (NDSS) ...

Best Cybersecurity Company in Ahmedabad

Amid the vibrant energy of Manek Chowk and the city’s growing tech landscape, Ahmedabad represents the perfect harmony of tradition and innovation. As the best cybersecurity company in Ahmedabad, Kratikal is proud to enhance the city’s ...

Exploring the Concept of Enterprise Security Management

Understand Enterprise Security Management (ESM) and its importance in safeguarding organizations. Explore key components, integration with SSO, and best practices for robust security. The post Exploring the Concept of Enterprise Security ...

Is a CIAM Certification Beneficial?

Explore the pros & cons of CIAM certification for authentication & software development. Learn about career benefits, core skills validated, and how it compares to other certifications. The post Is a CIAM Certification Beneficial? ...