Application Security News and Articles


How to defend against a password spraying attack?

Password spraying attacks are becoming a serious threat, especially targeting Active Directory environments. These attacks enable attackers to exploit weak passwords and gain unauthorised access by applying login attempts across multiple ...

How to Prevent Kerberoasting Attacks?

Kerberoasting attack targets the Active Directory environment to enable attackers to extract and crack service account credentials. Threat actors can gain elevated privileges by exploiting weak password policies and misconfiguration, which ...

Evolution and Growth: The History of Penetration Testing

The history of penetration testing begins with military strategies used to test enemy defenses. Over time, this evolved into a formal practice for identifying vulnerabilities in computer systems. This article traces the brief history of of ...

Keeping Your Cloud Deployments Safe and Sound

Are You Effectively Securing Your Cloud Deployments? Organizations rely heavily on cloud technology for their daily operations. However, the rising tide of cyber threats poses enormous challenges for businesses to keep their cloud deployments ...

Proactively Managing NHIs to Prevent Breaches

Why is Proactive NHI Management Essential to Prevent Breaches? One might often ponder, how can organizations significantly strengthen their cybersecurity postures? The answer lies in the proactive management of Non Human Identities (NHIs) to ...

Secure Secrets Setup: Sleep Soundly at Night

Why is Securing Secrets and NHIs Necessary for Your Peace of Mind? Managing cybersecurity is a critical part of modern business operations, considering growing threat. But did you know that one of the most overlooked aspects of cybersecurity is ...

Empower Your Team with Efficient Secrets Rotation

Are Your Secrets Safe? Think Again! Data breaches and cybercrimes are major concerns. It’s an unfortunate reality that security breaches have become increasingly common. You might think your organization’s secrets are well-guarded, but are ...

Eclypsium @ RSAC 2025

The post Eclypsium @ RSAC 2025 appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Eclypsium @ RSAC 2025 appeared first on Security Boulevard.

Key Insights: Is Vulnerability Management at Its Breaking Point?

The post Key Insights: Is Vulnerability Management at Its Breaking Point? appeared first on AI Security Automation. The post Key Insights: Is Vulnerability Management at Its Breaking Point? appeared first on Security Boulevard.

BSidesLV24 – Keynotes – Day Two: Homicideware

Authors/Presenters: Andrea M. Matwyshyn Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

How to Check Email Deliverability?

Struggling with emails landing in spam? Learn how to check email deliverability effectively, troubleshoot common issues, and improve inbox placement. The post How to Check Email Deliverability? appeared first on Security Boulevard.

Passkeys vs. Passwords: A Detailed Comparison

Explore the evolving landscape of digital security as we delve into the distinctions between passkeys and passwords. Understand their unique features, advantages, and potential drawbacks to determine the optimal choice for safeguarding your ...

Emulating the Sophisticated Russian Adversary Seashell Blizzard

AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Russian adversary Seashell Blizzard. The post Emulating the Sophisticated ...

Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering

Adaptive is pitching a security platform designed to replicate real-world attack scenarios through AI-generated deepfake simulations.  The post Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering appeared first on ...

Vulnerabilities Expose Jan AI Systems to Remote Manipulation

Vulnerabilities in open source ChatGPT alternative Jan AI expose systems to remote, unauthenticated manipulation. The post Vulnerabilities Expose Jan AI Systems to Remote Manipulation appeared first on SecurityWeek.

DMARC Adoption among APAC’s Higher Education Sector

On the heels of our DMARC adoption research in Europe’s higher education sector, we’re taking a look to see how schools in the Asia Pacific region are faring with their email security. The post DMARC Adoption among APAC’s Higher Education ...

Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion

Cyberhaven bags $100 million in funding at a billion-dollar valuation, a sign that investors remain bullish on data security startups. The post Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion appeared first on SecurityWeek.

Strata Identity CEO to Present Session on Identity Resilience at CyberArk Impact 2025 Conference

Co-author of SAML federation standard Eric Olden will explain how to architect IAM for uninterrupted operation during identity provider outages BOULDER, Colo., April 2, 2025 — Strata Identity, the Identity Orchestration company, today announced ...

The Future of Security Operations: Why Next-Gen SIEM is a Necessity

Transitioning to a modern SIEM model can achieve significant cost savings while enhancing security visibility and operational efficiency.  The post The Future of Security Operations: Why Next-Gen SIEM is a Necessity appeared first on Security ...

Modern SecOPs TCO Analysis: The Economic Case for Unified Security Platforms

In today’s rapidly evolving threat landscape, organizations face mounting challenges with traditional, fragmented security approaches. This analysis examines the total cost of ownership (TCO) of conventional security infrastructures compared to ...