Application Security News and Articles


Are You Certain Your Secrets Are Safe?

Is Your Organization Fully Protected Against Security Breaches? Non-Human Identities (NHIs) have emerged as key players in fortifying the security of cloud environments. When an amalgamation of encrypted keys, these machine identities function as ...

Satisfied with Your NHI Lifecycle Management?

Is Your NHI Lifecycle Management Really Satisfying Your Security Needs? I invite you to ponder this question: Is your Non-Human Identity Lifecycle Management (NHI) really delivering the security outcomes you desire? NHIs, or machine identities, ...

How NHIs Can Deliver Real Business Value

Are NHIs the Unsung Heroes of Cybersecurity? It’s no secret that cybersecurity is a top priority for organizations, but did you know how crucial Non-Human Identities (NHIs) can be? To put it in simple terms, an NHI is a machine identity, ...

DMARC Adoption in U.S. and Canada Higher Education Sector

We’re looking at how DMARC adoption is shaping the email security landscape of colleges and universities in North America. The post DMARC Adoption in U.S. and Canada Higher Education Sector appeared first on Security Boulevard.

Cloud Native Security: How to Protect Your Kubernetes Infrastructure

As organizations increasingly adopt cloud-native technologies, securing Kubernetes infrastructure has become more important than ever. Cloud-native security encompasses practices and tools designed specifically to protect applications, data, and ...

BSidesLV24 – HireGround – What Goes Bump in the Night? Recruiter Panel About Job Search and Other Scary Things

Authors/Presenters: Kris Rides, Silvia Lemos, Ricki Burke, Kirsten Renner Our sincere appreciation to [BSidesLV][1], and the Presenters/Authors for publishing their erudite [Security BSidesLV24][2] content. Originating from the conference’s ...

Hunters International Dumps Ransomware, Goes Full-on Extortion

Hunters International, the RaaS group that some believe evolved from Hive, appears to be rebranding and shifting operations, moving away from an unprofitable and risky ransomware business and focusing solely on exfiltrating data and extorting ...

CMMC Level 2 Documentation: What Auditors Want to See

If you’re part of the defense industrial base and you’re seeking CMMC certification, there’s a very good chance you’re aiming for Level 2. Level 1 is mostly meant for businesses with a focus on federal contract information but not CUI, ...

AI Security Got Complicated Fast. Here’s How Microsoft is Simplifying It

Microsoft’s approach offers a compelling opportunity to secure AI, leverage AI-driven security tools and establish a self-reinforcing ecosystem where AI agents effectively collaborate within defined organizational boundaries The post AI ...

Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’

Classic “wordplay:” Larry’s PR angels desperately dance on the head of a pin. The post Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’ appeared first on Security Boulevard.

Call Records of Millions Exposed by Verizon App Vulnerability

A patch has been released for a serious information disclosure vulnerability affecting a Verizon call filtering application. The post Call Records of Millions Exposed by Verizon App Vulnerability appeared first on SecurityWeek.

BSidesLV24 – HireGround – Brute Force Your Job Application

Author/Presenter: Ricki Burke Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

In Other News: Apple Improving Malware Detection, Cybersecurity Funding, Cyber Command Chief Fired

Noteworthy stories that might have slipped under the radar: Apple adding TCC events to Endpoint Security, cybersecurity funding report for Q1 2025, Trump fires the head of NSA and Cyber Command. The post In Other News: Apple Improving Malware ...

Key Findings From Kaseya’s 2025 Global MSP Benchmark Report

Discover key insights from the 2025 Global MSP Benchmark report, including trends in cybersecurity, co-managed IT, M&A strategies and operational efficiency. The post Key Findings From Kaseya’s 2025 Global MSP Benchmark Report appeared ...

When AI Agents Start Whispering: The Double-Edged Sword of Autonomous Agent Communication

AI agents develop their own communication channels beyond our monitoring frameworks, we face a pivotal challenge: harnessing their collaborative problem-solving potential while preventing security breaches and compliance violations that could ...

BSides San Diego 2025: Shifting the Risk Conversation By The Sea Shore

Discover how BSidesSD 2025 challenged traditional GRC, spotlighted data poisoning, and promoted human-driven security insights. Read our highlights from this community event. The post BSides San Diego 2025: Shifting the Risk Conversation By The ...

News alert: YRIKKA’s ‘Red Teaming’ API advances AI safety, reliability in high-stakes applications

New York, NY, Apr. 3, 2025 — YRIKKA has released the first publicly available API for agentic red teaming of Visual AI assets. This release comes at the heels of YRIKKA successfully raising its pre-seed funding round of $1.5M led … (more…) ...

Design, implement, and deploy application protection policies with Cursor Agent | Impart Security

Introducing Impart + Cursor: Truly Autonomous Application Protection Runtime Security Without the Babysitting Security teams can now define application protection policies declaratively in Impart — with Cursor's agent executing them safely and ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat

CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has been around for two decades but has seen a resurgence in ...

Cybersecurity Snapshot: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security techniques. In addition, CISA and other cyber agencies warn that attackers ...